Path: blob/master/documentation/modules/auxiliary/scanner/http/citrix_dir_traversal.md
25656 views
Introduction
An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. The vulnerability, tracked as CVE-2019-19781, allows for directory traversal. If exploited, it could allow an unauthenticated attacker to perform arbitrary code execution.
Because vulnerable servers allow for directory traversal, they will accept the request GET /vpn/../vpns/ and process it as a request for GET /vpns/, a directory that contains PERL scripts that can be targeted to allow for limited file writing on the vulnerable host.
This module checks if a target server is vulnerable by issuing an HTTP GET request for /vpn/../vpns/cfg/smb.confand then checking the response for [global] since this configuration file should contain global variables. If [global] is found, the server is vulnerable to CVE-2019-19781.
Verification Steps
Install the module as usual
Start msfconsole
Do:
use auxiliary/scanner/http/citrix_dir_traversalDo:
set RHOSTS [IP]Do:
run
Options
Proxies. This option is not set by default.RPORT. The default setting is80. To use:set RPORT [PORT]SSL. The default setting isfalse.THREADS. The default setting is1.VHOST. This option is not set by default.TARGETURI. This option is the base path./by default.PATH. This option is the traversal path./vpn/../vpns/cfg/smb.confby default.