PT-2011-34: HTTP Response Splitting in Citrix XenServer Web Self Service

Vulnerable software

Citrix XenServer Web Self Service
Version: 1.1 and earlier

Link:
http://www.citrix.com/English/ps2/products/feature.asp?contentID=2316933

Severity level

Severity level: Medium
Impact: HTTP Response Splitting
Access Vector: Remote

CVSS v2:
Base Score: 4.3
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE: not assigned

 

Vulnerability description

The specialists of the Positive Research center have detected "HTTP Response Splitting" vulnerability in Citrix XenServer Web Self Service.

GET parameter page of the login page allows one to insert an arbitrary HTTP header into the server response.

How to fix

Update your software up to the latest version

Advisory status

10.11.2011 - Vendor is notified
10.11.2011 - Vendor gets vulnerability details
10.03.2012 - Vendor releases fixed version and details
28.09.2012 - Public disclosure

Credits

The vulnerability has discovered by Maxim Tsoy, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-34
http://support.citrix.com/article/CTX132219

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/