VMware vCloud Director 5.5.x < 5.5.6 Client Integration Plugin Session Hijacking (VMSA-2016-0004)

Medium Nessus Plugin ID 90711


A virtualization appliance installed on the remote host is affected by a session hijacking vulnerability.


The version of VMware vCloud Director installed on the remote host is 5.5.x prior to 5.5.6. It is, therefore, affected by a flaw in the VMware Client Integration Plugin due to a failure to handle session content in a secure manner. A remote attacker can exploit this, by convincing a user to visit a malicious web page, to conduct a session hijacking attack. It can also be exploited to carry out a man-in-the-middle attack.


Upgrade to VMware vCloud Director version 5.5.6 or later.

See Also


Plugin Details

Severity: Medium

ID: 90711

File Name: vmware_vcloud_director_vmsa-2016-0004.nasl

Version: $Revision: 1.7 $

Type: local

Family: Misc.

Published: 2016/04/26

Modified: 2016/12/05

Dependencies: 91829

Risk Information

Risk Factor: Medium


Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vcloud_director

Required KB Items: Host/VMware vCloud Director/Version, Host/VMware vCloud Director/Build

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2016/04/14

Vulnerability Publication Date: 2016/04/14

Reference Information

CVE: CVE-2016-2076

OSVDB: 137167

VMSA: 2016-0004