Citrix ADC and Citrix NetScaler Gateway Multiple Vulnerabilities (CTX281474)

high Nessus Plugin ID 140790

Synopsis

The remote device is affected by multiple vulnerabilities.

Description

The remote Citrix ADC or Citrix NetScaler Gateway device is version 11.1.x prior to 11.1-65.12, 12.1.x prior to 12.1-58.15 or 12.1-FIPS prior to 12.1-55.187 13.0.x prior to 13.0-64.35. It is, therefore, affected by multiple vulnerabilities:
- A HTML injection vulnerability exists in Citrix ADC due to improper validation of user-supplied input.
An unauthenticated, remote attacker can exploit this to inject arbitrary content into responses generated by the application (CVE-2020-8245).

- A denial of service (DoS) vulnerability exists in Citrix ADC. An unauthenticated, remote attacker can exploit this issue, to impose a DoS condition on the application (CVE-2020-8246).

- A privilege escalation vulnerability exists in management interface component. An authenticated, remote attacker can exploit this, to gain privileged access to the system (CVE-2020-8247).

Please refer to advisory CTX281474 for more information.

Solution

For versions 11.1.x, 12.1.x, 12.1-FIPS and 13.0.x, upgrade to 11.1-65.12, 12.1-58.15, 12.1-55.296-FIPS and 13.0-64.35, or later, respectively.

See Also

https://support.citrix.com/article/CTX281474

Plugin Details

Severity: High

ID: 140790

File Name: citrix_netscaler_CTX281474.nasl

Version: 1.7

Type: combined

Family: CGI abuses

Published: 9/25/2020

Updated: 2/12/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2020-8247

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:citrix:netscaler_gateway, cpe:/h:citrix:netscaler_application_delivery_controller

Required KB Items: Host/NetScaler/Detected

Exploit Ease: No known exploits are available

Patch Publication Date: 9/17/2020

Vulnerability Publication Date: 9/17/2020

Reference Information

CVE: CVE-2020-8245, CVE-2020-8246, CVE-2020-8247

IAVA: 2020-A-0434-S