Описание
Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.
Ссылки
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Permissions Required
- ExploitThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Broken LinkThird Party AdvisoryVDB Entry
- Permissions Required
- ExploitThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 9.1.2.26.561201 (включая)
cpe:2.3:a:citrix:netscaler_sd-wan:*:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.87787
Высокий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID.
fstec
почти 9 лет назад
Уязвимость компонента интерфейса управления средства доставки веб-приложений NetScaler SD-WAN, позволяющая нарушителю выполнить произвольную shell-команду
EPSS
Процентиль: 99%
0.87787
Высокий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
NVD-CWE-noinfo