Vulnerability Description
Static code injection vulnerability in config/writeconfig.php in the sample code in the XenServer Resource Kit in Citrix XenCenterWeb allows remote attackers to inject arbitrary PHP code into include/config.ini.php via the pool1 parameter. NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citrix | Xencenterweb | All versions |
Related Weaknesses (CWE)
References
- http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txtExploit
- http://securitytracker.com/id?1022520
- http://www.exploit-db.com/exploits/9106
- http://www.securityfocus.com/archive/1/504764Exploit
- http://www.securityfocus.com/bid/35592Exploit
- http://www.vupen.com/english/advisories/2009/1814Vendor Advisory
- http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txtExploit
- http://securitytracker.com/id?1022520
- http://www.exploit-db.com/exploits/9106
- http://www.securityfocus.com/archive/1/504764Exploit
- http://www.securityfocus.com/bid/35592Exploit
- http://www.vupen.com/english/advisories/2009/1814Vendor Advisory
FAQ
What is CVE-2009-3760?
CVE-2009-3760 is a vulnerability with a CVSS score of 7.5 (HIGH). Static code injection vulnerability in config/writeconfig.php in the sample code in the XenServer Resource Kit in Citrix XenCenterWeb allows remote attackers to inject arbitrary PHP code into include/...
How severe is CVE-2009-3760?
CVE-2009-3760 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-3760?
Check the references section above for vendor advisories and patch information. Affected products include: Citrix Xencenterweb.