#VU9171 Information disclosure in vCenter Server - CVE-2017-4928
Published: November 10, 2017
Vulnerability identifier: #VU9171
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-4928
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
vCenter Server
vCenter Server
Software vendor:
VMware, Inc
VMware, Inc
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted POST requests via the Flash-based vSphere Web Client to trigger a URL validation flaw and conduct server side request forgery (SSRF) and carriage return line feed (CRLF) injection attacks to gain access to arbitrary data.
The weakness exists due to insufficient validation of user-supplied input. A remote attacker can send specially crafted POST requests via the Flash-based vSphere Web Client to trigger a URL validation flaw and conduct server side request forgery (SSRF) and carriage return line feed (CRLF) injection attacks to gain access to arbitrary data.
Remediation
Update to version 5.5 U3f, 6.0 U3c.