Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2016-7463 |
CWE-ID | CWE-79 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
VMware ESXi Operating systems & Components / Operating system |
Vendor | VMware, Inc |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU1431
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/U:Clear]
CVE-ID: CVE-2016-7463
CWE-ID:
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via malicious VM (virtual machine) image. A remote attacker can create a specially crafted VM image, containing XSS exploit, trick the victim into importing the image and permanently store arbitrary HTML and script code, which will be executed in victim’s browser in context of vulnerable website every time the victim visits vulnerable interface.
Successful exploitation of the vulnerability may allow an attacker to gain access to potentially sensitive data.
Mitigation
The vendor has issued the following patches to address this vulnerability:
ESXi 6.0
ESXi 5.5
VMware ESXi: 5.5 - 6.0
CPE2.3 External linkshttps://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=21458...
https://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=21481...
https://www.vmware.com/security/advisories/VMSA-2016-0023.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.