| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.0 | $0-$5k | 0.00 |
Summary
A vulnerability categorized as problematic has been discovered in Citrix XenServer 4.1.0. This issue affects some unknown processing of the component XenAPI. Such manipulation leads to cross site scripting. This vulnerability is listed as CVE-2008-3253. The attack may be performed from remote. In addition, an exploit is available. It is advisable to upgrade the affected component.
Details
A vulnerability was found in Citrix XenServer 4.1.0 (Virtualization Software). It has been rated as critical. Affected by this issue is an unknown functionality of the component XenAPI. The manipulation with an unknown input leads to a cross site scripting vulnerability. Using CWE to declare the problem leads to CWE-79. The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Cross-site scripting (XSS) vulnerability in the XenAPI HTTP interfaces in Citrix XenServer Express, Standard, and Enterprise Edition 4.1.0; Citrix XenServer Dell Edition (Express and Enterprise) 4.1.0; and HP integrated Citrix XenServer (Select and Enterprise) 4.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
The weakness was presented 07/23/2008 with TEPCO (Website). The advisory is shared for download at support.citrix.com. This vulnerability is handled as CVE-2008-3253 since 07/22/2008. The attack may be launched remotely. No form of authentication is required for exploitation. Successful exploitation requires user interaction by the victim. Technical details are unknown but an exploit is available. The MITRE ATT&CK project declares the attack technique as T1059.007.
It is declared as highly functional. As 0-day the estimated underground price was around $25k-$100k.
Upgrading to version XenServer-4.1.0-hotfix2 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at support.citrix.com. The best possible mitigation is suggested to be upgrading to the latest version. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the databases at X-Force (43857), SecurityFocus (BID 30265†), OSVDB (47062†), Secunia (SA31133†) and SecurityTracker (ID 1020515†). If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.citrix.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.3VulDB Meta Temp Score: 6.0
VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross site scriptingCWE: CWE-79 / CWE-94 / CWE-74
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: XenServer XenServer-4.1.0-hotfix2
Patch: support.citrix.com
Timeline
07/16/2008 🔍07/16/2008 🔍
07/16/2008 🔍
07/17/2008 🔍
07/17/2008 🔍
07/17/2008 🔍
07/22/2008 🔍
07/22/2008 🔍
07/23/2008 🔍
08/13/2008 🔍
04/07/2015 🔍
06/24/2017 🔍
Sources
Vendor: citrix.comAdvisory: support.citrix.com
Organization: TEPCO
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2008-3253 (🔍)
GCVE (CVE): GCVE-0-2008-3253
GCVE (VulDB): GCVE-100-3788
X-Force: 43857 - Citrix XenServer XenAPI HTTP interfaces cross-site scripting, Medium Risk
SecurityFocus: 30265 - Citrix XenServer XenAPI HTTP Interfaces Cross-Site Scripting Vulnerability
Secunia: 31133 - Citrix XenServer XenAPI HTTP Interface Cross-Site Scripting, Less Critical
OSVDB: 47062 - Citrix XenServer XenAPI HTTP Interface Unspecified XSS
SecurityTracker: 1020515 - Citrix XenServer Input Validation Flaw in XenAPI HTTP Interface Permits Cross-Site Scripting Attacks
Vulnerability Center: 49380 - Citrix XenServer Remote XSS due to Improper Validation of User Input by the XenAPI HTTP Interface, Medium
Vupen: ADV-2008-2117
scip Labs: https://www.scip.ch/en/?labs.20161013
Entry
Created: 08/13/2008 12:07Updated: 06/24/2017 11:52
Changes: 08/13/2008 12:07 (83), 06/24/2017 11:52 (5)
Complete: 🔍
Cache ID: 216:FF9:103
No comments yet. Languages: en.
Please log in to comment.