VMSA-2016-0023 : VMware ESXi updates address a cross-site scripting issue

Low Nessus Plugin ID 96084


The remote VMware ESXi host is missing a security-related patch.


a. Host Client stored cross-site scripting issue

The ESXi Host Client contains a vulnerability that may allow for stored cross-site scripting (XSS). The issue can be introduced by an attacker that has permission to manage virtual machines through ESXi Host Client or by tricking the vSphere administrator to import a specially crafted VM. The issue may be triggered on the system from where ESXi Host Client is used to manage the specially crafted VM.

VMware advises not to import VMs from untrusted sources.

VMware would like to thank Caleb Watt (@calebwatt15) for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7463 to this issue.


Apply the missing patch.

See Also


Plugin Details

Severity: Low

ID: 96084

File Name: vmware_VMSA-2016-0023.nasl

Version: $Revision: 3.3 $

Type: local

Published: 2016/12/22

Modified: 2017/01/09

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 3.5

Temporal Score: 2.9

Vector: CVSS2#AV:N/AC:M/Au:S/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 5.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/o:vmware:esxi:5.5, cpe:/o:vmware:esxi:6.0

Required KB Items: Host/local_checks_enabled, Host/VMware/release, Host/VMware/version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/12/20

Reference Information

CVE: CVE-2016-7463

OSVDB: 149018

VMSA: 2016-0023

IAVB: 2017-B-0001, 2017-B-0002