First published: Thu Oct 22 2009(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allow remote attackers to hijack the authentication of administrators for (1) requests that change the password via the username parameter to config/changepw.php or (2) stop a virtual machine via the stop_vmname parameter to hardstopvm.php. NOTE: some of these details are obtained from third party information.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix XenCenterWeb | ||
Citrix XenCenterWeb |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3759 has a high severity rating due to its potential to allow remote attackers to hijack administrator sessions.
To fix CVE-2009-3759, ensure that security patches are applied and implement anti-CSRF tokens in requests to vulnerable endpoints.
CVE-2009-3759 affects all versions of Citrix XenCenterWeb prior to the implementation of security fixes.
By exploiting CVE-2009-3759, attackers can perform unauthorized actions as an authenticated administrator, such as changing passwords.
No, user interaction is not required to exploit CVE-2009-3759, making it particularly dangerous as it can be executed remotely.