Client Integration Plugin (CIP) in VMware vCenter Server 5.5 U3a, U3b, and U3c and 6.0 before U2; vCloud Director 5.5.5; and vRealize Automation Identity Appliance 6.2.4 before 6.2.4.1 mishandles session content, which allows remote attackers to hijack sessions via a crafted web site.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1035570 | Third Party Advisory |
http://www.securitytracker.com/id/1035571 | Third Party Advisory |
http://www.securitytracker.com/id/1035572 | Third Party Advisory |
http://www.vmware.com/security/advisories/VMSA-2016-0004.html | Vendor Advisory |
http://www.securitytracker.com/id/1035570 | Third Party Advisory |
http://www.securitytracker.com/id/1035571 | Third Party Advisory |
http://www.securitytracker.com/id/1035572 | Third Party Advisory |
http://www.vmware.com/security/advisories/VMSA-2016-0004.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2016-04-15 14:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-2076
Mitre link : CVE-2016-2076
CVE.ORG link : CVE-2016-2076
JSON object : View
Products Affected
vmware
- vcloud_automation_identity_appliance
- vcenter_server
- vcloud_director
CWE
CWE-287
Improper Authentication