Secunia points us out to these vulnerabilities
Corsaire has reported some vulnerabilities in VMware ESX Server, which can be exploited to gain knowledge of potentially sensitive information or conduct cross-site request forgery attacks.
1) When changing passwords using the management interface, the GET request containing the password in clear text is logged to a world-readable file.
2) The management interface uses a proprietary session ID format containing authentication credentials encoded in base64. If malicious people get hold of the session cookies, it's possible to gain knowledge of the user account and password.
3) The management interface allows users to perform certain actions via HTTP GET requests without performing any validity checks to verify the user's request. This can be exploited to change a user's password when user visits a malicious web site while logged in.
The same time , I already had an email from VMware releasing its update patch 3 for 2.5.3 and for 2.0.2.
Good job VMware and Secunia!
Comments
Post a Comment