Web application security specialists report the presence of a serious security flaw in Citrix NetSclaer/ADC that, if exploited, could allow an unauthenticated threat actor to perform arbitrary code execution on the target system.
The details revealed so far by Citrix are still minimal, although multiple web application security firms mention the identification of at least three components exposed to the exploitation of this flaw; the combination of the three vulnerable elements allows code execution attacks on the target NetScaler/ADC device.
Vulnerabilities allow threat actors to bypass a security layer (or authorization restriction) for creating a file with user-controlled content, which will then be processed using a server-side scripting language. There may be other ways to perform arbitrary code execution, so system administrators are advised to remain alert to new reports.
All supported product versions of Citrix ADC (formerly NetScaler) and Citrix Gateway are affected, web application security experts report. An attacker with access to the affected system’s web interface could exploit the flaw to take control of the system, access private network resources and perform many other malicious tasks by hijacking authenticated user sessions or stealing credentials a user’s login.
The company recommends to its users the implementation of a specific response policy to filter out possible exploitation attempts. In addition, specialists at the International Institute of Cyber Security (IICS) recommend that system administrators apply the mitigations necessary to reduce the risk of exploitation while security updates issued by the company are available.
Tripwire IP360 starting with ASPL-865 contains remote heuristic detection of the vulnerable service. External attempts to exploit this flaw will likely include HTTP requests with ‘/.. /’ and ‘/vpns/’ in the URL. This was noted in the mitigation steps suggested by Citrix. Administrators should also watch for requests with custom headers that contain walk patterns (for example, ‘/.. /’).
He is a well-known expert in mobile security and malware analysis. He studied Computer Science at NYU and started working as a cyber security analyst in 2003. He is actively working as an anti-malware expert. He also worked for security companies like Kaspersky Lab. His everyday job includes researching about new malware and cyber security incidents. Also he has deep level of knowledge in mobile security and mobile vulnerabilities.