VMSA-2020-0008:VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability

VMware vSphere ESXi

0 more products

23575

26 April 2020

12 April 2020

CLOSED

HIGH

8.3

CVE-2020-3955

VMSA-2020-0008
8.3
2020-04-28
2020-04-28 (Initial Advisory)
CVE-2020-3955
VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability (CVE-2020-3955)
1. Impacted Products

VMware ESXi

2. Introduction

A Stored Cross-Site Scripting (XSS) vulnerability in VMware ESXi was privately reported to VMware. Patches are available to address this vulnerability in affected VMware products.

3a. Advisory Details

Description

The VMware ESXi Host Client does not properly neutralize script-related HTML when viewing virtual machines attributes. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.3.

Known Attack Vectors

A malicious actor with access to modify the system properties of a  virtual machine from inside the guest os (such as changing the hostname of the virtual machine) may be able to inject malicious script which will be executed by a victim's browser when viewing this virtual machine via the ESXi Host Client.

Resolution

To remediate CVE-2020-3955 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below.
 

Workarounds

None.

Additional Documentation

None.

Notes

None.

Acknowledgements

VMware would like to thank Benny Husted, zixian, and DAWUSHI for independently reporting this issue to us.

Response Matrix

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
ESXi
7.0
Any
CVE-2020-3955
N/A
N/A
Unaffected
N/A
N/A
ESXi
6.7
Any
CVE-2020-3955
None
None
ESXi
6.5
Any
8.3
None
None
4. References
5. Change Log

2020-04-28 VMSA-2020-0008

Initial security advisory.

6. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
 
This Security Advisory is posted to the following lists:
  [email protected]
  [email protected]
  [email protected]
 
E-mail: [email protected]
PGP key at:
https://kb.vmware.com/kb/1055
 
VMware Security Advisories
https://www.vmware.com/security/advisories
 
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
 
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
 
VMware Security & Compliance Blog  
https://blogs.vmware.com/security
 
Twitter
https://twitter.com/VMwareSRC
 
Copyright 2020 VMware Inc. All rights reserved.