Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2009-3759 First vendor Publication 2009-10-22
Vendor Cve Last vendor Modification 2024-02-08

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Overall CVSS Score 8.8
Base Score 8.8 Environmental Score 8.8
impact SubScore 5.9 Temporal Score 8.8
Exploitabality Sub Score 2.8
 
Attack Vector Network Attack Complexity Low
Privileges Required None User Interaction Required
Scope Unchanged Confidentiality Impact High
Integrity Impact High Availability Impact High
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:S/C:P/I:P/A:P)
Cvss Base Score 6 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 6.8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Multiple cross-site request forgery (CSRF) vulnerabilities in sample code in the XenServer Resource Kit in Citrix XenCenterWeb allow remote attackers to hijack the authentication of administrators for (1) requests that change the password via the username parameter to config/changepw.php or (2) stop a virtual machine via the stop_vmname parameter to hardstopvm.php. NOTE: some of these details are obtained from third party information.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3759

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-62 Cross Site Request Forgery (aka Session Riding)
CAPEC-111 JSON Hijacking (aka JavaScript Hijacking)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
59208 Citrix XenCenterWeb XenServer Resource Kit hardstopvm.php stop_vmname Paramet...

59207 Citrix XenCenterWeb XenServer Resource Kit config/changepw.php username Param...

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/35592
BUGTRAQ http://www.securityfocus.com/archive/1/504764
EXPLOIT-DB http://www.exploit-db.com/exploits/9106
MISC http://securenetwork.it/ricerca/advisory/download/SN-2009-01.txt
SECTRACK http://securitytracker.com/id?1022520
VUPEN http://www.vupen.com/english/advisories/2009/1814
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/51576

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2024-02-09 00:28:13
  • Multiple Updates
2021-05-04 12:10:22
  • Multiple Updates
2021-04-22 01:10:49
  • Multiple Updates
2020-05-23 00:24:30
  • Multiple Updates
2017-09-19 09:23:28
  • Multiple Updates
2017-08-17 09:22:45
  • Multiple Updates
2013-05-10 23:59:54
  • Multiple Updates