First published: Fri Nov 17 2017(Updated: )
The flash-based vSphere Web Client (6.0 prior to 6.0 U3c and 5.5 prior to 5.5 U3f) i.e. not the new HTML5-based vSphere Client, contains SSRF and CRLF injection issues due to improper neutralization of URLs. An attacker may exploit these issues by sending a POST request with modified headers towards internal services leading to information disclosure.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter Server | =5.5 | |
VMware vCenter Server | =5.5-1 | |
VMware vCenter Server | =5.5-1a | |
VMware vCenter Server | =5.5-1b | |
VMware vCenter Server | =5.5-1c | |
VMware vCenter Server | =5.5-2 | |
VMware vCenter Server | =5.5-2b | |
VMware vCenter Server | =5.5-2d | |
VMware vCenter Server | =5.5-2e | |
VMware vCenter Server | =5.5-3 | |
VMware vCenter Server | =5.5-3a | |
VMware vCenter Server | =5.5-3b | |
VMware vCenter Server | =5.5-3d | |
VMware vCenter Server | =5.5-3e | |
VMware vCenter Server | =5.5-b | |
VMware vCenter Server | =5.5-c | |
VMware vCenter Server | =6.0 | |
VMware vCenter Server | =6.0-1 | |
VMware vCenter Server | =6.0-1b | |
VMware vCenter Server | =6.0-2 | |
VMware vCenter Server | =6.0-2a | |
VMware vCenter Server | =6.0-2m | |
VMware vCenter Server | =6.0-3 | |
VMware vCenter Server | =6.0-3a | |
VMware vCenter Server | =6.0-3b | |
VMware vCenter Server | =6.0-a | |
VMware vCenter Server | =6.0-b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4928 is a vulnerability in the flash-based vSphere Web Client that allows SSRF and CRLF injection attacks.
The severity of CVE-2017-4928 is high, with a severity value of 7.5.
The affected software for CVE-2017-4928 is VMware vCenter Server versions 5.5 and 6.0.
An attacker can exploit CVE-2017-4928 by sending a POST request with modified headers towards the vSphere Web Client.
More information about CVE-2017-4928 can be found on the following websites: SecurityFocus, SecurityTracker, and VMware's security advisories.