Enhancement: cves/2019/CVE-2019-12985.yaml by md

patch-1
MostInterestingBotInTheWorld 2023-04-12 13:46:47 -04:00
parent 3365b1cd22
commit 579c2411b5
1 changed files with 5 additions and 3 deletions

View File

@ -1,15 +1,15 @@
id: CVE-2019-12985
info:
name: Citrix SD-WAN Center - Unauthenticated Remote Command Injection
name: Citrix SD-WAN Center - Remote Command Injection
author: gy741
severity: critical
description: |
The ping action in DiagnosticsController is susceptible to command injection by a remote, unauthenticated attacker. Specifically, the ping function does not sufficiently validate or sanitize HTTP request parameter values that are used to construct a shell command. An attacker can trigger this vulnerability by routing traffic through the Collector controller and supplying a crafted value for ipAddress, pingCount, or packetSize.
Citrix SD-WAN Center is susceptible to remote command injection via the ping function in DiagnosticsController, which does not sufficiently validate or sanitize HTTP request parameter values used to construct a shell command. An attacker can trigger this vulnerability by routing traffic through the Collector controller and supplying a crafted value for ipAddress, pingCount, or packetSize, thereby potentially being able to obtain sensitive information, modify data, and/or execute unauthorized operations.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2019-12985
- https://www.tenable.com/security/research/tra-2019-31
- https://support.citrix.com/article/CTX251987
- https://nvd.nist.gov/vuln/detail/CVE-2019-12985
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
@ -42,3 +42,5 @@ requests:
- type: dsl
dsl:
- 'contains(body_1, "<title>Citrix SD-WAN</title>")'
# Enhanced by md on 2023/04/12