VMware ESX Server Multiple Vulnerabilities |
Thursday, 03 August 2006 by Michel Roth | |||
1) When changing passwords using the management interface, the GET request containing the password in clear text is logged to a world-readable file. 2) The management interface uses a proprietary session ID format containing authentication credentials encoded in base64. If malicious people get hold of the session cookies, it's possible to gain knowledge of the user account and password. 3) The management interface allows users to perform certain actions via HTTP GET requests without performing any validity checks to verify the user's request. This can be exploited to change a user's password when user visits a malicious web site while logged in. Read the Secunia Advisory.
Show/Hide comment form
|