VMware vCenter Server updates address an important cross-site scripting issue.
vCenter Server 6.0 prior to 6.0 update 2
vCenter Server 5.5 prior to 5.5 update 3d
vCenter Server 5.1 prior to 5.1 update 3d
a. Reflected cross-site scripting issue through flash parameter injection
The vSphere Web Client contains a reflected cross-site scripting vulnerability that occurs through flash parameter injection. An attacker can exploit this issue by tricking a victim into clicking a malicious link. VMware would like to thank John Page aka hyp3rlinx for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2016-2078 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
*Client side component of the vSphere Web Client does not need to be updated to remediate CVE-2016-2078. Updating the vCenter Server is sufficient to remediate this issue.
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
Downloads and Documentation:
6. Change log
Initial security advisory in conjunction with the release of VMware vCenter Server 5.1 U3d on 2016-05-24.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
Consolidated list of VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
Copyright 2016 VMware Inc. All rights reserved.