CVE-2009-3757

Citrix Xencenterweb - XSS

Title source: rule
STIX 2.1

Description

Multiple cross-site scripting (XSS) vulnerabilities in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter to config/edituser.php; (2) location, (3) sessionid, and (4) vmname parameters to console.php; (5) vmrefid and (6) vmname parameters to forcerestart.php; and (7) vmname and (8) vmrefid parameters to forcesd.php. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Secure Network · textremotewindows
https://www.exploit-db.com/exploits/9106

References (7)

Core 7
Core References
Exploit mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/504764
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/1814
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1022520
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/35592
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/51575
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9106

Scores

EPSS 0.0765
EPSS Percentile 91.9%

Details

CWE
CWE-79
Status published
Products (1)
citrix/xencenterweb
Published Oct 22, 2009
Tracked Since Feb 18, 2026