First published: Tue Jul 22 2008(Updated: )
Cross-site scripting (XSS) vulnerability in the XenAPI HTTP interfaces in Citrix XenServer Express, Standard, and Enterprise Edition 4.1.0; Citrix XenServer Dell Edition (Express and Enterprise) 4.1.0; and HP integrated Citrix XenServer (Select and Enterprise) 4.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
XenServer | =4.1.0 | |
XenServer | =4.1.0 | |
XenServer | =4.1.0 | |
XenServer | =4.1.0 | |
XenServer | =4.1.0 | |
XenServer | =4.1.0 | |
XenServer | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-3253 is considered high due to its potential to allow remote code execution through cross-site scripting.
To fix CVE-2008-3253, users should upgrade to a patched version of Citrix XenServer that addresses this XSS vulnerability.
CVE-2008-3253 affects Citrix XenServer versions 4.1.0 across various editions including Express, Standard, and Enterprise.
CVE-2008-3253 is classified as a cross-site scripting (XSS) vulnerability.
Yes, CVE-2008-3253 can be exploited remotely by attackers targeting the XenAPI HTTP interfaces.