0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 5 years have passed since last update.

[更新][漏洞通告]CVE-2019-19781/Citrix ADC&NetScaler存在目录遍历&远程代码执行

0
Last updated at Posted at 2020-01-11

漏洞描述

Citrix ADC&NetScaler的10.5、11.1、12.0、12.1、13.0等版本中,被发现存在目录遍历.该漏洞可允许未授权访问服务器上的一些文件.随着各大安全研究员进一步深入研究,发现/vpn/portal/scripts/存在一些perl脚本.尤其是newbm.pl脚本,该脚本运行写入一些文件到服务器中.那么结合这些脚本,原本是目录遍历的漏洞升级成为远程代码执行的漏洞.目前该漏洞远程代码执行方式的EXP已经公布于互联网,请资产管理员尽快采取缓解措施.

CVE编号

CVE-2019-19781

漏洞威胁等级

高危

影响范围

10.5
11.1
12.0
12.1
13.0

漏洞验证

使用公开的RCE payload进行验证
image.png

缓解措施

参考官网:https://support.citrix.com/article/CTX267679

时间轴

[0] 2019/12/27 NVD发布该漏洞
[1] 2020/01/09 亚信安全网络攻防实验室根据公开的路径遍历POC复现该漏洞并发布漏洞通告
[2] 2020/01/11 亚信安全网络攻防实验室根据公开的RCE POC复现该漏洞并发布漏洞通告

Reference

https://nvd.nist.gov/vuln/detail/CVE-2019-19781
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781
https://github.com/projectzeroindia/CVE-2019-19781
https://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/

0
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?