PLUGIN NAME:ESXI 6.5/6.7 XSS(VMSA-2020-0008)

今天要跟大家分享的是关于VMWARE 的系统缺陷。

这是一个远程VMware 主机缺少安全补丁, 而被跨越站点的脚本XSS安全漏洞影响。


下面是关于这个问题的具体的描述:

The remote VMware ESXi host is version 6.5 or 6.7 and is affected by a cross-site scripting (XSS) vulnerability in virtual machine attributes due to improper validation of user-supplied input before returning it to users. An authenticated, remote attacker with access to modify the system properties of a virtual machine from inside the guest OS can exploit this, by inserting script-related HTML in the system properties and having a user view the system properties from the ESXi Host Client, to execute arbitrary script code in a user's ESXi Host Client session.

简单的总结来说,远程VMware ESXi主机版本为6.5或6.7,会有虚拟机跨站点脚本的安全漏洞,主要是利用用户提供的输入的验证信息,在返回给用户进程之前,进行非法验证。通过非法身份验证的黑客可以从客户操作系统内部修改虚拟机的系统属性,通过在系统属性中插入与脚本相关的HTML,可以让任何一个用户从ESXi Host Client查看系统属性,可以在用户的ESXi Host Client会话中执行任意脚本代码。

参照Nessus 发布的插件补丁的输出:

Vulnerability sharing for day 3_系统属性

Solution

Apply the appropriate patch as referenced in the vendor advisory.

对于这一类问题的解决方案就是升级插件的版本到最新版本,就可以解决因此带来的安全缺陷问题。