Citrix SD-WAN Cookie Command Injection

critical Nessus Plugin ID 121386

Synopsis

The remote host is affected by a remote command injection vulnerability.

Description

The remote Citrix SD-WAN appliance is affected by a remote command injection vulnerability due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can exploit this, via a specially crafted cookie in an HTTP request, to execute arbitrary commands on the appliance.

Solution

Upgrade to version 9.2.1.1001 or later.

See Also

https://support.citrix.com/article/CTX225990

Plugin Details

Severity: Critical

ID: 121386

File Name: citrix_sdwan_cookie_cmd_injection.nasl

Version: 1.9

Type: remote

Family: CGI abuses

Published: 1/25/2019

Updated: 4/25/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2017-6316

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:citrix:sd-wan

Required KB Items: installed_sw/Citrix SD-WAN

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 7/25/2017

Vulnerability Publication Date: 2/20/2017

CISA Known Exploited Vulnerability Due Dates: 4/15/2022

Exploitable With

Elliot (Citrix NetScaler SD-WAN RCE)

Reference Information

CVE: CVE-2017-6316

BID: 99943