PT-2011-37: HTTP Response Splitting in Citrix XenServer Virtual Switch Controller

Vulnerable software

Citrix XenServer Virtual Switch Controller
Version: 6.0.1 and earlier

Application link: 
http://support.citrix.com/article/CTX129669

Severity level

Severity level: Medium
Impact: HTTP response splitting
Access Vector: Network exploitable 

CVSS v2: 
Base Score: 4.3 
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVE: not assigned

 

Vulnerability description

Positive Research Center has discovered a HTTP Response Splitting in Citrix XenServer Virtual Switch Controller.

GET parameter last_page of the login page allows one to insert an arbitrary HTTP header into the server response.

How to fix

Update your software up to the latest version

Advisory status

10.11.2011 - Vendor is notified
10.11.2011 - Vendor gets vulnerability details
13.03.2012 - Vendor releases fixed version and details
27.03.2012 - Public disclosure

Credits

The vulnerability was discovered by Maxim Tsoy, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-37
https://support.citrix.com/article/CTX132476

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/