CVE-2017-6316
CRITICAL
9,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
HIGH
10,0
Source: [email protected]
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: complete
Integrity: complete
Availability: complete
Description
AI Translation Available
Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,8779
Percentile
1,0th
Updated
EPSS Score Trend (Last 90 Days)
Exploit
Netscaler SD-WAN 9.1.2.26.561201 - Command Injection (Metasploit)
Netscaler SD-WAN 9.1.2.26.561201 - Command Injection (Metasploit)
View Exploit Code →
Exploit
Citrix CloudBridge - 'CAKEPHP' Cookie Command Injection
Citrix CloudBridge - 'CAKEPHP' Cookie Command Injection
View Exploit Code →
Application
Netscaler Sd-Wan by Citrix
Version Range Affected
To
9.1.2.26.561201
(inclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017…
https://support.citrix.com/article/CTX225990
https://www.exploit-db.com/exploits/42345/
https://www.exploit-db.com/exploits/42346/
http://www.securityfocus.com/bid/99943
http://www.securitytracker.com/id/1039019
https://support.citrix.com/article/CTX225990
https://www.exploit-db.com/exploits/42345/
https://www.exploit-db.com/exploits/42346/
http://www.securityfocus.com/bid/99943
http://www.securitytracker.com/id/1039019