Description
Multiple cross-site scripting (XSS) vulnerabilities in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allow remote attackers to inject arbitrary web script or HTML via the (1) username parameter to config/edituser.php; (2) location, (3) sessionid, and (4) vmname parameters to console.php; (5) vmrefid and (6) vmname parameters to forcerestart.php; and (7) vmname and (8) vmrefid parameters to forcesd.php. NOTE: some of these details are obtained from third party information.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Secure Network · textremotewindows
https://www.exploit-db.com/exploits/9106
References (7)
Core 7
Core References
Exploit mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/504764
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/1814
Exploit x_refsource_misc
http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txt
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1022520
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/35592
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/51575
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/9106
Scores
EPSS
0.0765
EPSS Percentile
91.9%
Details
CWE
CWE-79
Status
published
Products (1)
citrix/xencenterweb
Published
Oct 22, 2009
Tracked Since
Feb 18, 2026