CVE-2009-3758

Citrix Xencenterweb - SQL Injection

Title source: rule
STIX 2.1

Description

SQL injection vulnerability in login.php in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allows remote attackers to execute arbitrary SQL commands via the username parameter. NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Secure Network · textremotewindows
https://www.exploit-db.com/exploits/9106

References (7)

Core 7
Core References
Exploit mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/504764
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2009/1814
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/51574
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1022520
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/35592
Exploit, Third Party Advisory exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/9106

Scores

EPSS 0.0097
EPSS Percentile 76.7%

Details

CWE
CWE-89
Status published
Products (1)
citrix/xencenterweb
Published Oct 22, 2009
Tracked Since Feb 18, 2026