Vulnerabilites related to citrix - mpx_15100-50g_fips
Vulnerability from fkie_nvd
Published
2021-08-05 21:15
Modified
2024-11-21 05:50
Severity ?
Summary
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed.
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX319135 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX319135 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92AEAC43-113D-456B-89C0-1872A67224AC", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC22F7-EA37-48D7-822D-B66EE2B25FE2", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1035921-397B-4E88-AF1A-DF581B75B4B2", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "4564E909-7F8E-40DF-B941-FFACC03B97B7", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB5357D6-4995-4966-8B63-11E636AD58BC", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE3B890B-5A0E-4B5A-A9E1-0C6DDF9524E6", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B222CD-3235-4153-97B0-D8F6FF1FB7BE", "versionEndExcluding": "10.2.9.b", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "22226FCE-A3D3-4FAB-909A-7922AAC3035A", "versionEndExcluding": "11.2.3.b", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "C0A54438-E0DA-4134-87FE-D7BFE30A3BAA", "versionEndExcluding": "11.3.2.a", "versionStartIncluding": "11.3", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB0A1FE7-9F5D-476E-A3E0-2B6260DE0366", "versionEndExcluding": "11.4.0.a", "versionStartIncluding": "11.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:4000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C848BC-98F7-41D4-A262-8B7EB304F4C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:4100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3979EFF-AE6E-4274-97E2-58C7E01C920E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5000-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "C87AF39E-6BCF-4188-BAB1-A5CBDEBF662E", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:5100-wo:-:*:*:*:*:*:*:*", "matchCriteriaId": "38514675-1C15-460C-B34C-2633A8A36A78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed." }, { "lang": "es", "value": "Se ha detectado una vulnerabilidad en Citrix ADC (conocido anteriormente como NetScaler ADC) y Citrix Gateway (conocido anteriormente como NetScaler Gateway), y en los modelos 4000-WO, 4100-WO, 5000-WO y 5100-WO de Citrix SD-WAN WANOP Edition. Estas vulnerabilidades, si son explotadas, podr\u00edan conllevar a el consumo total del limitado espacio de disco disponible en los dispositivos" } ], "id": "CVE-2021-22919", "lastModified": "2024-11-21T05:50:54.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-05T21:15:10.997", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-770" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-05 21:15
Modified
2024-11-21 05:50
Severity ?
Summary
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session.
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX319135 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX319135 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "92AEAC43-113D-456B-89C0-1872A67224AC", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40FC22F7-EA37-48D7-822D-B66EE2B25FE2", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1035921-397B-4E88-AF1A-DF581B75B4B2", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "4564E909-7F8E-40DF-B941-FFACC03B97B7", "versionEndExcluding": "12.1-62.27", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB5357D6-4995-4966-8B63-11E636AD58BC", "versionEndExcluding": "13.0-82.45", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE3B890B-5A0E-4B5A-A9E1-0C6DDF9524E6", "versionEndExcluding": "11.1-65.22", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de fijaci\u00f3n de sesi\u00f3n en Citrix ADC y Citrix Gateway versi\u00f3n 13.0-82.45, cuando es configurado el proveedor de servicios SAML que podr\u00eda permitir a un atacante secuestrar una sesi\u00f3n" } ], "id": "CVE-2021-22927", "lastModified": "2024-11-21T05:50:56.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-05T21:15:11.643", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX319135" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-16 14:15
Modified
2024-11-21 05:38
Severity ?
Summary
Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX297155 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX297155 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "003574BC-2C37-44D6-9F5E-E931F5ECE169", "versionEndExcluding": "12.1-62.23", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAE6C6C5-2C85-484E-A61A-C17096C4D9F7", "versionEndExcluding": "13.0-82.41", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D77B2AD2-BAF1-4FD3-B7C5-88AC1B130971", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E178AA28-B24F-4565-A314-1E58AAC54648", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "024F407E-F369-4B9C-BC3C-5CB0FF613526", "versionEndExcluding": "12.1-62.23", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5675439-B8C6-4ABD-8D53-F2D9BB49F33D", "versionEndExcluding": "13.0-82.41", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible." }, { "lang": "es", "value": "Citrix ADC y Citrix/NetScaler Gateway versiones anteriores a 13.0-82.41, 12.1-62.23, 11.1-65.20 y Citrix ADC 12.1-FIPS versiones anteriores a 12.1-55.238, sufren de un control de acceso inapropiado que permite el secuestro de la autenticaci\u00f3n SAML mediante un ataque de phishing para robar una sesi\u00f3n de usuario v\u00e1lida. Tome en cuenta que Citrix ADC o Citrix Gateway deben estar configurados como un SP SAML o un IdP SAML para que esto sea posible" } ], "id": "CVE-2020-8300", "lastModified": "2024-11-21T05:38:41.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-16T14:15:08.440", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-16 14:15
Modified
2024-11-21 05:38
Severity ?
Summary
Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance.
References
▼ | URL | Tags | |
---|---|---|---|
support@hackerone.com | https://support.citrix.com/article/CTX297155 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX297155 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "871316FC-14DC-41BE-971B-61FBE11D5ABF", "versionEndExcluding": "12.1-61.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAA24333-CF47-45C2-81E3-C990095920D6", "versionEndExcluding": "13.0-76.29", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "D77B2AD2-BAF1-4FD3-B7C5-88AC1B130971", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E178AA28-B24F-4565-A314-1E58AAC54648", "versionEndExcluding": "11.1-65.20", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AEBA65F-2FEA-45B2-9118-8781258BC28D", "versionEndExcluding": "12.1-61.18", "versionStartIncluding": "12.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F78FBC6-84A1-4D99-8D70-BA5AF4B1F2BD", "versionEndExcluding": "13.0-76.29", "versionStartIncluding": "13.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BEBCAD2-581F-4217-8425-46C03584E673", "versionEndExcluding": "12.1-55.238", "versionStartIncluding": "12.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCB11BC1-0702-436F-BFE2-14B38B118D99", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "8569B182-D0A7-414B-B0A3-4DD2FAB44F69", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABB9B3E9-EED4-4D74-BE4C-DFAFAB1F0994", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F60729DF-EDC8-4462-ABD2-6E4199F22701", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "B789F02A-56CB-4871-9D9D-FAB0F31A72A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "06699186-E7E4-463C-8844-77B2A750B985", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "F00DBEBF-29BE-4D6A-BF79-19208AAB0D7F", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "848169A6-CAD7-4E14-BC5D-B2E94DC93CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C69709C-885A-4F19-899D-A7B5CE7066EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B2136C1-8AB6-4C70-87F4-1F8A93A876C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "492323D2-339D-404C-BB9B-E09ABB87FA2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB83185D-DD6F-47CD-B500-499F9EF65093", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2E30C0C-32F2-4257-B946-600E3123A0D2", "versionEndExcluding": "10.2.9a", "versionStartIncluding": "10.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "469E2490-71B8-48FB-A032-08922C75339A", "versionEndExcluding": "11.1.2c", "versionStartIncluding": "11.1", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "56A52140-F4AE-4616-91E7-FF941EA26343", "versionEndExcluding": "11.2.3a", "versionStartIncluding": "11.2", "vulnerable": true }, { "criteria": "cpe:2.3:o:citrix:sd-wan_wanop:*:*:*:*:*:*:*:*", "matchCriteriaId": "974341A5-6B06-4975-9406-CF41AB0E92F6", "versionEndExcluding": "11.3.2", "versionStartIncluding": "11.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance." }, { "lang": "es", "value": "Citrix ADC y Citrix/NetScaler Gateway versiones 13.0 anteriores a 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC versiones 12.1-FIPS anteriores a 12.1-55.238, y Citrix SD-WAN WANOP Edition versiones anteriores a 11.4.0, 11. 3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a, sufren un consumo no controlado de recursos mediante una denegaci\u00f3n de servicio basada en la red desde el mismo segmento de red de capa 2. Tome en cuenta que el atacante debe estar en el mismo segmento de red de capa 2 que el dispositivo vulnerable" } ], "id": "CVE-2020-8299", "lastModified": "2024-11-21T05:38:41.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-16T14:15:08.107", "references": [ { "source": "support@hackerone.com", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.citrix.com/article/CTX297155" } ], "sourceIdentifier": "support@hackerone.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "support@hackerone.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-22927
Vulnerability from cvelistv5
Published
2021-08-05 20:16
Modified
2024-08-03 18:58
Severity ?
EPSS score ?
Summary
A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session.
References
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX319135 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Version: Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Version: Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Version: Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:26.168Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX319135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0" }, { "status": "affected", "version": "Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1" }, { "status": "affected", "version": "Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1" }, { "status": "affected", "version": "Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS" } ] } ], "descriptions": [ { "lang": "en", "value": "A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "Session Fixation (CWE-384)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-05T20:16:42", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX319135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0" }, { "version_value": "Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1" }, { "version_value": "Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1" }, { "version_value": "Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Session Fixation (CWE-384)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX319135", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX319135" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22927", "datePublished": "2021-08-05T20:16:42", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:26.168Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8300
Vulnerability from cvelistv5
Published
2021-06-16 13:08
Modified
2024-08-04 09:56
Severity ?
EPSS score ?
Summary
Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
References
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX297155 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway |
Version: Fixed in Citrix ADC and Citrix Gateway 13.0 before 13.0-82.41, Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX297155" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in Citrix ADC and Citrix Gateway 13.0 before 13.0-82.41, Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238" } ] } ], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control - Generic (CWE-284)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T13:08:16", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX297155" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8300", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway", "version": { "version_data": [ { "version_value": "Fixed in Citrix ADC and Citrix Gateway 13.0 before 13.0-82.41, Citrix ADC and Citrix Gateway 12.1 before 12.1-62.23, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control - Generic (CWE-284)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX297155", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX297155" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8300", "datePublished": "2021-06-16T13:08:16", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8299
Vulnerability from cvelistv5
Published
2021-06-16 13:08
Modified
2024-08-04 09:56
Severity ?
EPSS score ?
Summary
Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance.
References
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX297155 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP Edition |
Version: Fixed in Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0, Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1, Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1, Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS, Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4, Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3, Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3, Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2, Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1, Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:56:28.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX297155" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP Edition", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0, Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1, Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1, Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS, Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4, Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3, Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3, Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2, Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1, Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "Denial of Service (CWE-400)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-16T13:08:22", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX297155" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2020-8299", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP Edition", "version": { "version_data": [ { "version_value": "Fixed in Citrix ADC and Citrix Gateway 13.0-76.29 and later releases of 13.0, Citrix ADC and Citrix Gateway 12.1-61.18 and later releases of 12.1, Citrix ADC and NetScaler Gateway 11.1-65.20 and later releases of 11.1, Citrix ADC 12.1-FIPS 12.1-55.238 and later releases of 12.1-FIPS, Citrix SD-WAN WANOP 11.4.0 and later releases of 11.4, Citrix SD-WAN WANOP 11.3.2 and later releases of 11.3, Citrix SD-WAN WANOP 11.3.1a and later releases of 11.3, Citrix SD-WAN WANOP 11.2.3a and later releases of 11.2, Citrix SD-WAN WANOP 11.1.2c and later releases of 11.1, Citrix SD-WAN WANOP 10.2.9a and later releases of 10.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Citrix ADC and Citrix/NetScaler Gateway 13.0 before 13.0-76.29, 12.1-61.18, 11.1-65.20, Citrix ADC 12.1-FIPS before 12.1-55.238, and Citrix SD-WAN WANOP Edition before 11.4.0, 11.3.2, 11.3.1a, 11.2.3a, 11.1.2c, 10.2.9a suffers from uncontrolled resource consumption by way of a network-based denial-of-service from within the same Layer 2 network segment. Note that the attacker must be in the same Layer 2 network segment as the vulnerable appliance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service (CWE-400)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX297155", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX297155" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2020-8299", "datePublished": "2021-06-16T13:08:22", "dateReserved": "2020-01-28T00:00:00", "dateUpdated": "2024-08-04T09:56:28.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22919
Vulnerability from cvelistv5
Published
2021-08-05 20:16
Modified
2024-08-03 18:58
Severity ?
EPSS score ?
Summary
A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed.
References
▼ | URL | Tags |
---|---|---|
https://support.citrix.com/article/CTX319135 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP |
Version: Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS Citrix SD-WAN WANOP Edition 11.4.0a and later releases of 11.4 Citrix SD-WAN WANOP Edition 11.3.2a and later releases of 11.3 Citrix SD-WAN WANOP Edition 11.2.3b and later releases of 11.2 Citrix SD-WAN WANOP Edition 10.2.9b and later releases of 10.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:58:25.542Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.citrix.com/article/CTX319135" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS Citrix SD-WAN WANOP Edition 11.4.0a and later releases of 11.4 Citrix SD-WAN WANOP Edition 11.3.2a and later releases of 11.3 Citrix SD-WAN WANOP Edition 11.2.3b and later releases of 11.2 Citrix SD-WAN WANOP Edition 10.2.9b and later releases of 10.2" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "Allocation of Resources Without Limits or Throttling (CWE-770)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-05T20:16:46", "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "shortName": "hackerone" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.citrix.com/article/CTX319135" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "support@hackerone.com", "ID": "CVE-2021-22919", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Citrix ADC, Citrix Gateway, Citrix SD-WAN WANOP", "version": { "version_data": [ { "version_value": "Citrix ADC and Citrix Gateway 13.0-82.45 and later releases of 13.0 Citrix ADC and Citrix Gateway 12.1-62.27 and later releases of 12.1 Citrix ADC and NetScaler Gateway 11.1-65.22 and later releases of 11.1 Citrix ADC 12.1-FIPS 12.1-55.247 and later releases of 12.1-FIPS Citrix SD-WAN WANOP Edition 11.4.0a and later releases of 11.4 Citrix SD-WAN WANOP Edition 11.3.2a and later releases of 11.3 Citrix SD-WAN WANOP Edition 11.2.3b and later releases of 11.2 Citrix SD-WAN WANOP Edition 10.2.9b and later releases of 10.2" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to the limited available disk space on the appliances being fully consumed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Allocation of Resources Without Limits or Throttling (CWE-770)" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.citrix.com/article/CTX319135", "refsource": "MISC", "url": "https://support.citrix.com/article/CTX319135" } ] } } } }, "cveMetadata": { "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1", "assignerShortName": "hackerone", "cveId": "CVE-2021-22919", "datePublished": "2021-08-05T20:16:46", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-08-03T18:58:25.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }