PT-2011-37: HTTP Response Splitting in Citrix XenServer Virtual Switch Controller
Vulnerable software
Citrix XenServer Virtual Switch Controller
Version: 6.0.1 and earlier
Application link:
http://support.citrix.com/article/CTX129669
Severity level
Severity level: Medium
Impact: HTTP response splitting
Access Vector: Network exploitable
CVSS v2:
Base Score: 4.3
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVE: not assigned
Vulnerability description
Positive Research Center has discovered a HTTP Response Splitting in Citrix XenServer Virtual Switch Controller.
GET parameter last_page of the login page allows one to insert an arbitrary HTTP header into the server response.
How to fix
Update your software up to the latest version
Advisory status
10.11.2011 - Vendor is notified
10.11.2011 - Vendor gets vulnerability details
13.03.2012 - Vendor releases fixed version and details
27.03.2012 - Public disclosure
Credits
The vulnerability was discovered by Maxim Tsoy, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2011-37
https://support.citrix.com/article/CTX132476
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/