Vulnerabilidad en Citrix Application Delivery Controller (ADC) and Gateway (CVE-2019-19781)
Gravedad CVSS v3.1:
CRÍTICA
Tipo:
CWE-22
Limitación incorrecta de nombre de ruta a un directorio restringido (Path Traversal)
Fecha de publicación:
27/12/2019
Última modificación:
03/04/2025
Descripción
Se descubrió un problema en Citrix Application Delivery Controller (ADC) and Gateway versiones 10.5, 11.1, 12.0, 12.1 y 13.0. Permiten un salto de directorio.
Impacto
Puntuación base 3.x
9.80
Gravedad 3.x
CRÍTICA
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:application_delivery_controller_firmware:11.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:application_delivery_controller_firmware:12.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:application_delivery_controller_firmware:12.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:application_delivery_controller_firmware:13.0:*:*:*:*:*:*:* | ||
cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:netscaler_gateway_firmware:11.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:netscaler_gateway_firmware:12.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:netscaler_gateway_firmware:12.1:*:*:*:*:*:*:* | ||
cpe:2.3:h:citrix:netscaler_gateway:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:* | ||
cpe:2.3:h:citrix:gateway:-:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html
- http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html
- https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/
- https://forms.gle/eDf3DXZAv96oosfj6
- https://support.citrix.com/article/CTX267027
- https://twitter.com/bad_packets/status/1215431625766424576
- https://www.kb.cert.org/vuls/id/619785
- http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html
- http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html
- https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/
- https://forms.gle/eDf3DXZAv96oosfj6
- https://support.citrix.com/article/CTX267027
- https://twitter.com/bad_packets/status/1215431625766424576
- https://www.kb.cert.org/vuls/id/619785