VMware vCenter Server updates address an important reflected cross-site scripting issue
VMware Security Advisory
VMware vCenter Server updates address an important reflected cross-site scripting issue.
2. Relevant Releases
vCenter Server 5.5 prior to 5.5 update 2d
vCenter Server 5.1 prior to 5.1 update 3d
vCenter Server 5.0 prior to 5.0 update 3g
3. Problem Description
a. Important vCenter Server reflected cross-site scripting issue
The vSphere Web Client contains a reflected cross-site scripting vulnerability due to a lack of input sanitization. An attacker can exploit this issue by tricking a victim into clicking a malicious link.
VMware would like to thank Matt Schmidt for reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2015-6931 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
Replace with/ Apply Patch
* The client side component of the vSphere Web Client does not need
to be updated to remediate CVE-2015-6931. Updating the vCenter Server is sufficient to remediate this issue.
Please review the patch/release notes for your product andversion and verify the checksum of your downloaded file.
Downloads and Documentation:
6. Change log
Initial security advisory in conjunction with the release of VMwarevCenter Server 5.0 U3g on 2016-06-14.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories
Consolidated list of VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
Copyright 2016 VMware Inc. All rights reserved.