Lucene search

K
ptsecurityPositive TechnologiesPT-2016-12
HistoryOct 23, 2015 - 12:00 a.m.

PT-2016-12: HTTP Header Injection in VMware vCenter Server and ESXi

2015-10-2300:00:00
Positive Technologies
www.ptsecurity.com
8

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.6%

PT-2016-12: HTTP Header Injection in VMware vCenter Server and ESXi

Vulnerable software

vCenter Server, ESXi
Version: 6.x

Links:
http://www.vmware.com/

Severity level

Severity level: Medium
Impact: Arbitrary HTTP header injection
Access Vector: Remote

CVSS v2:
Base Score: 5.5
Vector: (AV:N/AC:L/Au:S/C:P/I:P/A:N)

CVE: CVE-2016-5331

Software description

vCenter Server, ESXi - enterprise-level computer virtualization products.

Vulnerability description

The specialists of the Positive Research center have detected an HTTP Header Injection vulnerability in VMware vCenter Server and ESXi.

The application does not properly sanitize user input before using it in HTTP response headers that allows a malicious user to inject arbitrary headers into HTTP responses. This allows attackers to control the headers and body of the HTTP response which can be used for conducting Cross-Site Scripting (XSS) attacks and attacks on intermediate proxy servers.

How to fix

Update your software up to the latest version

Advisory status

23.10.2015 - Vendor gets vulnerability details
04.08.2016 - Vendor releases fixed version and details
11.08.2016 - Public disclosure

Credits

The vulnerability was detected by Vladimir Ivanov, Andrey Evlanin, Mikhail Stepankin, Artem Kondratenko and Arseniy Sharoglazov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2016-12
http://www.vmware.com/in/security/advisories/VMSA-2016-0010.html

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com
<http://en.securitylab.ru/lab/&gt;

About Positive Technologies

Positive Technologies is a leading provider of vulnerability assessment, compliance management and threat analysis solutions to more than 1,000 global enterprise clients. Our solutions work seamlessly across your entire business: securing applications in development; assessing your network and application vulnerabilities; assuring compliance with regulatory requirements; and blocking real-time attacks. Our commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on SCADA, Banking, Telecom, Web Application and ERP security, and distinction as the #1 fastest growing Security and Vulnerability Management firm in 2012, as shown in an IDC report*. To learn more about Positive Technologies please visit www.ptsecurity.com

*Source: IDC Worldwide Security and Vulnerability Management 2013-2017 Forecast and 2012 Vendor Shares, doc #242465, August 2013. Based on year-over-year revenue growth in 2012 for vendors with revenues of $20M+

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

74.6%