HomePentest-Tools.com Logo

Citrix ADC - Directory Traversal/Remote Code Execution CVE-2019-19781

Severity
CVSSv3 Score
9.8
Vulnerability description

Citrix ADC is affected by a Directory Traversal vulnerability that can lead to Remote Code Execution. The root cause of this vulnerability is that some scripts (e.g: "newbm.pl") accept parametrized information and can write arbitrary code to an XML file. Having the XML file on the server, a feature called "Perl Template Toolkit" can parse the file and execute the code inside.

Risk description

The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.

Exploit capabilities

Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.

Recommendation

Upgrade the Citrix server to a version higher than 10.5, 11.1, 12.0, 12.1, or 13.0 or follow the mitigation steps detailed in the advisory.

Codename
Not available
Detectable with
Network Scanner
Scan engine
Sniper
Exploitable with Sniper
Yes
CVE Published
Dec 1, 2019
Detection added at
Software Type
Firewall
Vendor
Citrix
Product
ADC