CVE-2016-5331
VMware vSphere Hypervisor (ESXi) HTTP Response Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
CRLF injection vulnerability in VMware vCenter Server 6.0 before U2 and ESXi 6.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
Vulnerabilidad de inyección CRLF en VMware vCenter Server 6.0 en versiones anteriores a U2 y ESXi 6.0 permite a atacantes remotos inyectar cabeceras HTTP arbitrarias y llevar a cabo ataques de separación de respuestas HTTP a través de vectores no especificados.
The SySS GmbH found out that the web server of VMware ESXi 6 is vulnerable to HTTP response injection attacks, as arbitrarily supplied URL parameters are copied in the HTTP header Location of the server response without sufficient input validation. Thus, an attacker can create a specially crafted URL with a specific URL parameter that injects attacker-controlled data to the response of the VMware ESXi web server. Depending on the context, this allows different attacks. If such a URL is visited by a victim, it may for example be possible to set web browser cookies in the victim's web browser, execute arbitrary JavaScript code, or poison caches of proxy servers.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2016-06-07 CVE Reserved
- 2016-08-05 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-93: Improper Neutralization of CRLF Sequences ('CRLF Injection')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/138211/VMware-vSphere-Hypervisor-ESXi-HTTP-Response-Injection.html | X_refsource_misc | |
http://seclists.org/fulldisclosure/2016/Aug/38 | Mailing List | |
http://www.securityfocus.com/archive/1/539128/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/92324 | Vdb Entry | |
http://www.securitytracker.com/id/1036543 | Vdb Entry | |
http://www.securitytracker.com/id/1036544 | Vdb Entry | |
http://www.securitytracker.com/id/1036545 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.vmware.com/security/advisories/VMSA-2016-0010.html | 2018-10-09 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Vcenter Server Search vendor "Vmware" for product "Vcenter Server" | <= 6.0 Search vendor "Vmware" for product "Vcenter Server" and version " <= 6.0" | update_1b |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | 6.0 Search vendor "Vmware" for product "Esxi" and version "6.0" | - |
Affected
|