Qualys Security Research Team has disclosed multiple vulnerabilities in Citrix NetScaler ADC and NetScaler Gateway. Citrix has addressed these vulnerabilities in CTX232161. The affected versions and CVEs are listed below.
| CVE(s) | Description | Product | Affected
Version : Build |
| CVE-2018-6810 | Directory Traversal Vulnerability | Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway | < 12.0 : 57.19 < 11.1 : 56.15 < 11.0 : 71.18 < 10.5 : 67.1 |
| CVE-2018-6808 | Arbitrary File Download Vulnerability | ||
| CVE-2018-6809 | Privilege Escalation Vulnerability | ||
| CVE-2018-6811 | Multiple Cross-Site Scripting vulnerabilities | ||
| CVE-2018-6186 | SSRF attack via the /rapi/read_url URI by an authenticated attacker who has a webapp account. The attacker can gain access to the nsroot account, and execute remote commands with root privileges. | Citrix NetScaler VPX |
Mitigation
We request our customers to update the firmware in the appliance as per CTX232161. Please scan your network using QID : 370797 to detect vulnerable machines.
Qualys Detection
The QID checks for vulnerable firmware versions on the appliance. The unauthenticated checks epa.html for firmware versions.
References
Citrix Security Updates : CTX232161