-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1457
          VMware ESXi patches address Stored Cross-Site Scripting
                    (XSS) vulnerability (CVE-2020-3955)
                               29 April 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware ESXi
Publisher:         VMWare
Operating System:  VMware ESX Server
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-3955  

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2020-0008.html

- --------------------------BEGIN INCLUDED TEXT--------------------

VMware Security Advisories

+------------+----------------------------------------------------------------+
|Advisory ID |VMSA-2020-0008                                                  |
+------------+----------------------------------------------------------------+
|Advisory    |Important                                                       |
|Severity    |                                                                |
+------------+----------------------------------------------------------------+
|CVSSv3 Range|8.3                                                             |
+------------+----------------------------------------------------------------+
|Synopsis    |VMware ESXi patches address Stored Cross-Site Scripting (XSS)   |
|            |vulnerability (CVE-2020-3955)                                   |
+------------+----------------------------------------------------------------+
|Issue Date  |2020-04-28                                                      |
+------------+----------------------------------------------------------------+
|Updated On  |2020-04-28 (Initial Advisory)                                   |
+------------+----------------------------------------------------------------+
|CVE(s)      |CVE-2020-3955                                                   |
+------------+----------------------------------------------------------------+

1. Impacted Products

VMware ESXi

2. Introduction

A Stored Cross-Site Scripting (XSS) vulnerability in VMware ESXi was privately
reported to VMware. Patches are available to address this vulnerability in
affected VMware products.

3. VMware ESXi patches address Stored Cross-Site Scripting (XSS) vulnerability
(CVE-2020-3955)

Description:
The VMware ESXi Host Client does not properly neutralize script-related HTML
when viewing virtual machines attributes. VMware has evaluated the severity of
this issue to be in the Important severity range with a maximum CVSSv3 base
score of 8.3.

Known Attack Vectors:
A malicious actor with access to modify the system properties of a virtual
machine from inside the guest os (such as changing the hostname of the virtual
machine) may be able to inject malicious script which will be executed by a
victim's browser when viewing this virtual machine via the ESXi Host Client.

Resolution:
To remediate CVE-2020-3955 apply the updates listed in the 'Fixed Version'
column of the 'Response Matrix' below.
 

Workarounds:
None.
 

Additional Documentation:
None.

Notes:
None.

Acknowledgements:

VMware would like to thank Benny Husted and DAWUSHI for independently reporting
this issue to us.

+-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+
|Product|Version|Running|CVE          |CVSSV3|Severity |Fixed Version       |Workarounds|Additional   |
|       |       |On     |Identifier   |      |         |                    |           |Documentation|
+-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+
|ESXi   |7.0    |Any    |CVE-2020-3955|N/A   |N/A      |Unaffected          |N/A        |N/A          |
+-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+
|ESXi   |6.7    |Any    |CVE-2020-3955|8.3   |Important|ESXi670-202004103-SG|None       |None         |
+-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+
|ESXi   |6.5    |Any    |CVE-2020-3955|8.3   |Important|ESXi650-201912104-SG|None       |None         |
+-------+-------+-------+-------------+------+---------+--------------------+-----------+-------------+

4. References


Fixed Version(s) and Release Notes:

VMware ESXi 6.7 ESXi670-202004103-SG

https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202004002.html


VMware ESXi 6.5 ESXi650-201912104-SG
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-201912002.html


Mitre CVE Dictionary Links:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3955


FIRST CVSSv3 Calculator:

https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/
I:H/A:H


5. Change log

2020-04-28 VMSA-2020-0008
Initial security advisory.


6. Contact

E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

This Security Advisory is posted to the following lists:

  security-announce@lists.vmware.com
  bugtraq@securityfocus.com
  fulldisclosure@seclists.org


E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055 

VMware Security Advisories
https://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog  
https://blogs.vmware.com/security

Twitter
https://twitter.com/VMwareSRC 

Copyright 2020 VMware Inc. All rights reserved.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=resa
-----END PGP SIGNATURE-----