Multiple cross-site request forgery (CSRF) vulnerabilities in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allow remote attackers to hijack the authentication of administrators for (1) requests that change the password via the username parameter to config/changepw.php or (2) stop a virtual machine via the stop_vmname parameter to hardstopvm.php. NOTE: some of these details are obtained from third party information.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/504764 | mailing list vdb entry exploit broken link third party advisory |
http://www.vupen.com/english/advisories/2009/1814 | vendor advisory broken link vdb entry |
http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txt | broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51576 | third party advisory vdb entry |
http://securitytracker.com/id?1022520 | broken link third party advisory vdb entry |
http://www.securityfocus.com/bid/35592 | vdb entry exploit broken link third party advisory |
http://www.exploit-db.com/exploits/9106 | third party advisory vdb entry exploit |