Vulnerability Details : CVE-2009-3759
Multiple cross-site request forgery (CSRF) vulnerabilities in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allow remote attackers to hijack the authentication of administrators for (1) requests that change the password via the username parameter to config/changepw.php or (2) stop a virtual machine via the stop_vmname parameter to hardstopvm.php. NOTE: some of these details are obtained from third party information.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2009-3759
- cpe:2.3:a:citrix:xencenterweb:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-3759
4.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-3759
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | 2024-02-08 |
CWE ids for CVE-2009-3759
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-3759
-
http://www.securityfocus.com/bid/35592
Broken Link;Exploit;Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2009/1814
Webmail: access your OVH emails on ovhcloud.com | OVHcloudBroken Link;Vendor Advisory
-
http://www.exploit-db.com/exploits/9106
citrix xencenterweb - Cross-Site Scripting / SQL Injection / Remote Code Execution - Windows remote ExploitExploit;Third Party Advisory;VDB Entry
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/51576
Citrix XenCenterWeb changepw.php cross-site request forgery CVE-2009-3759 Vulnerability ReportThird Party Advisory;VDB Entry
-
http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txt
SECURE NETWORK | Your Protection Our MissionBroken Link
-
http://www.securityfocus.com/archive/1/504764
Broken Link;Exploit;Third Party Advisory;VDB Entry
-
http://securitytracker.com/id?1022520
Broken Link;Third Party Advisory;VDB Entry
Jump to