Citrix ADC - Directory Traversal/Remote Code Execution (CVE-2019-19781)
- Severity
- CVSSv3 Score
- 9.8
- Exploitable with Sniper
- Yes
- Vulnerability description
Citrix ADC is affected by a Directory Traversal vulnerability that can lead to Remote Code Execution. The root cause of this vulnerability is that some scripts (e.g: "newbm.pl") accept parametrized information and can write arbitrary code to an XML file. Having the XML file on the server, a feature called "Perl Template Toolkit" can parse the file and execute the code inside.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.
- Recommendation
Upgrade the Citrix server to a version higher than 10.5, 11.1, 12.0, 12.1, or 13.0 or follow the mitigation steps detailed in the advisory.
- Detectable with
- Network Scanner
- Vuln date
- Dec 2019
- Published at
- Updated at
- Software Type
- Firewall
- Vendor
- Citrix
- Product
- ADC
- Codename
- Not available