VMware vCloud Director 5.5.x < 5.5.6 Client Integration Plugin Session Hijacking (VMSA-2016-0004)

high Nessus Plugin ID 90711

Synopsis

A virtualization appliance installed on the remote host is affected by a session hijacking vulnerability.

Description

The version of VMware vCloud Director installed on the remote host is 5.5.x prior to 5.5.6. It is, therefore, affected by a flaw in the VMware Client Integration Plugin due to a failure to handle session content in a secure manner. A remote attacker can exploit this, by convincing a user to visit a malicious web page, to conduct a session hijacking attack. It can also be exploited to carry out a man-in-the-middle attack.

Solution

Upgrade to VMware vCloud Director version 5.5.6 or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2016-0004.html

Plugin Details

Severity: High

ID: 90711

File Name: vmware_vcloud_director_vmsa-2016-0004.nasl

Version: 1.11

Type: local

Agent: unix

Family: Misc.

Published: 4/26/2016

Updated: 10/25/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2016-2076

CVSS v3

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vcloud_director

Required KB Items: Host/VMware vCloud Director/Version, Host/VMware vCloud Director/Build

Exploit Ease: No known exploits are available

Patch Publication Date: 4/14/2016

Vulnerability Publication Date: 4/14/2016

Reference Information

CVE: CVE-2016-2076

VMSA: 2016-0004