CVE-2019-19781

Description from NVD

An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.

Information Acquisition Date:2021-04-27T10:37Z
CVSS 2.0: 7.5 HIGH CVSS 3.x: 9.8 CRITICAL

▼ CVSS3 Vec CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

▼ CVSS2 Vec AV:N/AC:L/Au:N/C:P/I:P/A:P

NVD References

 https://support.citrix.com/article/CTX267027
     source:CONFIRM
     tags:Vendor Advisory    
 VU#619785
     source:CERT-VN
     tags:
 https://twitter.com/bad_packets/status/1215431625766424576
     source:MISC
     tags:
 https://forms.gle/eDf3DXZAv96oosfj6
     source:MISC
     tags:
 https://badpackets.net/over-25000-citrix-netscaler-endpoints-vulnerable-to-cve-2019-19781/
     source:MISC
     tags:
 http://packetstormsecurity.com/files/155930/Citrix-Application-Delivery-Controller-Gateway-10.5-Remote-Code-Execution.html
     source:MISC
     tags:
 http://packetstormsecurity.com/files/155905/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution-Traversal.html
     source:MISC
     tags:
 http://packetstormsecurity.com/files/155904/Citrix-Application-Delivery-Controller-Gateway-Remote-Code-Execution.html
     source:MISC
     tags:
 http://packetstormsecurity.com/files/155947/Citrix-ADC-NetScaler-Directory-Traversal-Remote-Code-Execution.html
     source:MISC
     tags:
 http://packetstormsecurity.com/files/155972/Citrix-ADC-Gateway-Path-Traversal.html
     source:MISC
     tags:

Description from Forti

Citrix Application Delivery Controller VPNs Directory Traversal

This indicates an attack attempt to exploit a Directory Traversal Vulnerability in Citrix Application Delivery Controller.The vulnerability is due to insufficient sanitizing of user supplied inputs. A remote attacker may be able to exploit this to execute arbitrary commands within the context of the application, via a crafted HTTP request.

Information Acquisition Date:2020/07/02

Affected Products

Citrix ADC and Citrix Gateway version 13.0 all supported builds
Citrix ADC and NetScaler Gateway version 12.1 all supported builds
Citrix ADC and NetScaler Gateway version 12.0 all supported builds
Citrix ADC and NetScaler Gateway version 11.1 all supported builds
Citrix NetScaler ADC and NetScaler Gateway version 10.5 all supported builds

Impact

System Compromise: Remote attackers can gain control of vulnerable systems.

Recommended Actions

Apply the most recent upgrade or patch from the vendor.
https://support.citrix.com/article/CTX267027

References

None

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag:



List of frequently cited URLs

URLNum of Times Referred to
https://security.paloaltonetworks.com/CVE-2020-2021178
https://lists.astaro.com/ASGV9-IPS-rules.html52
https://www.fireeye.com/blog/threat-research/2020/12/unauth...12
https://twitter.com/search?src=sprv&q=CVE-2019-197815
https://swarm.ptsecurity.com/5
https://threatpost.com/top-cves-trending-with-cybercriminal...4
https://www.citrix.com/blogs/2020/07/07/citrix-provides-con...4
https://noticiasseguridad.com/vulnerabilidades/oficina-del-...4
https://bit.ly/3q5CBiu3
https://ift.tt/3oZPb0T3
https://dcso.de/2020/01/16/a-curious-case-of-cve-2019-19781...3
https://www.fbi.gov/news/pressrel/press-releases/russian-fo...3
https://isc.sans.edu/diary/rss/269003
https://www.snort.org/downloads3
https://fortiguard.com/encyclopedia/ips/486533
https://blog.fox-it.com/2020/07/01/a-second-look-at-cve-201...3
https://www.us-cert.gov/ncas/alerts/aa20-133a3
http://tweetedtimes.com/v/21183?s=tnp3
https://www.checkpoint.com/defense/advisories/public/2020/c...3
https://www.proofpoint.com/us/daily-ruleset-update-summary-...3
http://www.watchguard.com/SecurityPortal/ThreatDetail.aspx?...3
https://www.hisolutions.com/detail/ransomware-angriffe-als-...3
https://attacksrfc.cstool.io/cve/CVE-2019-197813
https://www.thomaspreischl.de/cve-2019-19781/?utm_source=Re...3
http://update1.hillstonenet.com/support/IPS_Help/en/HTTP/32...3

Information from Twitter

User URL Info Source Date
ThomasPreischl https://www.thomaspreischl.com/cve-2019-19781/?utm_source=R... Source ThomasPreischl   1639941041758298115 2023/03/26

List of frequently cited URLs

URLNum of Times Referred to
security.paloaltonetworks.com178
lists.astaro.com52
www.fireeye.com12
twitter.com5
swarm.ptsecurity.com5
threatpost.com4
www.citrix.com4
noticiasseguridad.com4
bit.ly3
ift.tt3
dcso.de3
www.fbi.gov3
isc.sans.edu3
www.snort.org3
fortiguard.com3
blog.fox-it.com3
www.us-cert.gov3
tweetedtimes.com3
www.checkpoint.com3
www.proofpoint.com3
www.watchguard.com3
www.hisolutions.com3
attacksrfc.cstool.io3
www.thomaspreischl.de3
update1.hillstonenet.com3

Information from Twitter

User URL Info Source
ThomasPreischl thomaspreischl.com Show Tweet

GitHub Search Results: Up to 10
NameURL
trustedsec/cve-2019-19781 https://github.com/trustedsec/cve-2019-19781
projectzeroindia/CVE-2019-19781 https://github.com/projectzeroindia/CVE-2019-19781
mpgn/CVE-2019-19781 https://github.com/mpgn/CVE-2019-19781
cisagov/check-cve-2019-19781 https://github.com/cisagov/check-cve-2019-19781
jas502n/CVE-2019-19781 https://github.com/jas502n/CVE-2019-19781
fireeye/ioc-scanner-CVE-2019-19781 https://github.com/fireeye/ioc-scanner-CVE-2019-19781
MalwareTech/CitrixHoneypot https://github.com/MalwareTech/CitrixHoneypot
citrix/ioc-scanner-CVE-2019-19781 https://github.com/citrix/ioc-scanner-CVE-2019-19781
x1sec/CVE-2019-19781 https://github.com/x1sec/CVE-2019-19781
x1sec/citrixmash_scanner https://github.com/x1sec/citrixmash_scanner

GitHub Search Results: Up to 10
NameURL
trustedsec/cve-2019-19781 github.com
projectzeroindia/CVE-2019-19781 github.com
mpgn/CVE-2019-19781 github.com
cisagov/check-cve-2019-19781 github.com
jas502n/CVE-2019-19781 github.com
fireeye/ioc-scanner-CVE-2019-19781 github.com
MalwareTech/CitrixHoneypot github.com
citrix/ioc-scanner-CVE-2019-19781 github.com
x1sec/CVE-2019-19781 github.com
x1sec/citrixmash_scanner github.com

2023/03/26 Score : 0
Added Har-sia Database : 2020/02/04
Last Modified : 2023/03/26
Highest Scored Date : 2020/07/01
Highest Score : 26