Qualys Security Research Team has disclosed multiple vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway. Citrix has addressed these vulnerabilities in CTX232161. The affected versions and CVEs are listed below.
CVE(s) | Description | Product | Affected
Version : Build |
CVE-2018-6810 | Directory Traversal Vulnerability | Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway | < 12.0 : 57.19 < 11.1 : 56.15 < 11.0 : 71.18 < 10.5 : 67.1 |
CVE-2018-6808 | Arbitrary File Download Vulnerability | ||
CVE-2018-6809 | Privilege Escalation Vulnerability | ||
CVE-2018-6811 | Multiple Cross-Site Scripting vulnerabilities | ||
CVE-2018-6186 | SSRF attack via the /rapi/read_url URI by an authenticated attacker who has a webapp account. The attacker can gain access to the nsroot account, and execute remote commands with root privileges. | Citrix NetScaler VPX |
Mitigation
We request our customers to update the firmware in the appliance as per CTX232161. Please scan your network using QID : 370797 to detect vulnerable machines.
Qualys Detection
The QID checks for vulnerable firmware versions on the appliance. The unauthenticated checks epa.html for firmware versions.
References
Citrix Security Updates : CTX232161