Executive Summary
Summary | |
---|---|
Title | VMware ESXi updates address a cross-site scripting issue |
Informations | |||
---|---|---|---|
Name | VMSA-2016-0023 | First vendor Publication | 2016-12-20 |
Vendor | VMware | Last vendor Modification | 2016-12-20 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:S/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 3.5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 6.8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
a. Host Client stored cross-site scripting issue The ESXi Host Client contains a vulnerability that may allow for stored cross-site scripting (XSS). The issue can be introduced by an attacker that has permission to manage virtual machines through ESXi Host Client or by tricking the vSphere administrator to import a specially crafted VM. The issue may be triggered on the system from where ESXi Host Client is used to manage the specially crafted VM. VMware advises not to import VMs from untrusted sources. VMware would like to thank Caleb Watt (@calebwatt15) for reporting this issue to us. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-7463 to this issue. |
Original Source
Url : http://www.vmware.com/security/advisories/VMSA-2016-0023.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 2 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-12-22 | Name : The remote VMware ESXi host is missing a security-related patch. File : vmware_VMSA-2016-0023.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-12-30 05:24:42 |
|
2016-12-29 13:22:01 |
|
2016-12-23 13:25:29 |
|
2016-12-20 17:21:10 |
|