Vigil@nce: VMware, Cross Site Scripting via WebWorks Help
December 2009 by Vigil@nce
SYNTHESIS OF THE VULNERABILITY
An attacker can use the WebWorks Help in order to generate a Cross
Site Scripting in VMware applications.
Severity: 2/4
Consequences: client access/rights
Provenance: document
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 16/12/2009
IMPACTED PRODUCTS
– VMware ESX
– VMware Server
– VMware vCenter
DESCRIPTION OF THE VULNERABILITY
The WebWorks Help (wwhelp) format is used to create online help
pages. It is included in several VMware applications:
– VMware WebAccess (vCenter, ESX, VMware Server)
– Lab Manager
– Stage Manager
However, a Cross Site Scripting was announced in WebWorks Help. It
also impacts VMware products.
An attacker can therefore invite the victim to access to a
malicious url, in order to execute JavaScript code in the context
of impacted VMware products.
CHARACTERISTICS
Identifiers: CVE-2009-3731, VIGILANCE-VUL-9295, VMSA-2009-0017
http://vigilance.fr/vulnerability/VMware-Cross-Site-Scripting-via-WebWorks-Help-9295