{"id":12582,"date":"2020-01-13T18:01:23","date_gmt":"2020-01-13T17:01:23","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=12582"},"modified":"2024-10-03T00:46:39","modified_gmt":"2024-10-02T22:46:39","slug":"poc-for-citrix-adc-netscaler-vulnerability-cve-2019-19781","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/01\/13\/poc-for-citrix-adc-netscaler-vulnerability-cve-2019-19781\/","title":{"rendered":"PoC for Citrix ADC\/Netscaler vulnerability CVE-2019-19781"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" height=\"47\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/01\/13\/exploit-fr-citrix-adc-netscaler-schwachstelle-cve-2019-19781\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]There is an unpatched vulnerability CVE-2019-19781 in Citrix ADC (Application Delivery Controller, formerly Netscaler) and proof of concept (PoC) exploits have been available for a few days to exploit the vulnerability &#8211; and honeypots are already under attack. I got also reports from intrusion into networks in German companies. Administrators responsible for Citrix ADC need to take action.<\/p>\n<p><!--more--><\/p>\n<h2>Vulnerability CVE-2019-19781 in Citrix ADC<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/0b9448c1e3f74c41829b52cf307e09c1\" alt=\"\" width=\"1\" height=\"1\" \/>The vulnerability <a href=\"https:\/\/support.citrix.com\/article\/CTX267027\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-19781<\/a> <em>Vulnerability in Citrix Application Delivery Controller and Citrix Gateway leading to arbitrary code execution<\/em> exists in Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway).<\/p>\n<blockquote><p>Citrix (NetScaler) ADC is a load balancer and monitoring system. The Unified Gateway enables remote access to internal applications. This can include desktop applications as well as intranet or web applications.<\/p><\/blockquote>\n<p>The vulnerability, classified as critical, could allow a local, unprivileged attacker to execute unwanted code. Mikhail Klyuchnikov, security expert at Positive Technologies, <a href=\"https:\/\/web.archive.org\/web\/20240609194419\/https:\/\/www.ptsecurity.com\/ww-en\/about\/news\/citrix-vulnerability-allows-criminals-to-hack-networks-of-80000-companies\/\" target=\"_blank\" rel=\"noopener noreferrer\">discovered<\/a> this critical vulnerability.<\/p>\n<h2>Widely used<\/h2>\n<p>The Citrix ADC\/NetScaler is (according to a feedback from a specialist to me over the weekend) in use with at least 80,000 enterprise\/government customers. All companies that rely on Citrix XenApp\/XenDesktop to virtualize their applications usually also have a NetScaler in use.<\/p>\n<p>On December 24, 2019, I reported on the problem for which there is no patch available from Citrix so far in the article <a href=\"https:\/\/borncity.com\/win\/2019\/12\/24\/schwachstelle-in-citrix-produkten-gefhrdet-firmen-netzwerke\/\">Vulnerability in Citrix Apps put companies at risk<\/a>. The support <a href=\"https:\/\/support.citrix.com\/article\/CTX267679\">CTX267679 \u2013 Mitigation steps for CVE-2019-19781<\/a> explains how administrators can make the exploitability of the vulnerability more difficult in advance. explains how administrators can make the exploitability of the vulnerability more difficult in advance.<\/p>\n<h2>PoC and attacks<\/h2>\n<p>I had already noticed it on Friday or the weekend, Citrix ADC administrators might get some grey hair now. Last Saturday, Catalin Cimpanu already pointed out that two proof of concept code examples for the now called Shitrix vulnerability are publicly available.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Proof-of-concept code published for Citrix bug as attacks intensify<\/p>\n<p>* Not one, but two PoCs have been published for CVE-2019-19781 (also known as Shitrix now)<\/p>\n<p>* PoC 1: <a href=\"https:\/\/t.co\/gdIbWAAc49\">https:\/\/t.co\/gdIbWAAc49<\/a><br \/>\n* PoC 2: <a href=\"https:\/\/t.co\/tUiDcwpQ37\">https:\/\/t.co\/tUiDcwpQ37<\/a><a href=\"https:\/\/t.co\/5yFjnNrf65\">https:\/\/t.co\/5yFjnNrf65<\/a> <a href=\"https:\/\/t.co\/zzJcaeE8wE\">pic.twitter.com\/zzJcaeE8wE<\/a><\/p>\n<p>\u2014 Catalin Cimpanu (@campuscodi) <a href=\"https:\/\/twitter.com\/campuscodi\/status\/1215891476024045568?ref_src=twsrc%5Etfw\">January 11, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserveeef459c0de0340d4bcddf08bb565eb02\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>Cimpanu compiled the details in the linked ZDNet article. But in short: We know about the vulnerability, there is no patch, just a workaround to mitigate the vulnerability. At <a href=\"https:\/\/www.reddit.com\/r\/blueteamsec\/comments\/en4m7j\/multiple_exploits_for_cve201919781_citrix\/\" target=\"_blank\" rel=\"noopener noreferrer\">reddit.com there is<\/a> link collection on pointing to article with insights. And SANS institute has <a href=\"https:\/\/isc.sans.edu\/diary\/25704\" target=\"_blank\" rel=\"noopener noreferrer\">this article<\/a>.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">In my Citrix ADC honeypot, CVE-2019-19781 is being probed with attackers reading sensitive credential config files remotely using ..\/ directory traversal (a variant of this issue). So this is in the wild, active exploitation starting up. <a href=\"https:\/\/t.co\/pDZ2lplSBj\">https:\/\/t.co\/pDZ2lplSBj<\/a><\/p>\n<p>\u2014 Kevin Beaumont (@GossiTheDog) <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1214892555306971138?ref_src=twsrc%5Etfw\">January 8, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preservefd15843eb75d4d74ba1b0c7a03ced6b6\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>From security researcher Kevin Beaumont, I know that his Citrix ADC honeypots have been under attack for several days regarding the CVE-2019-19781 vulnerability and the attackers are trying to gain access to sensitive information. It seems that at Friday or during the weekend the first German companies have been hit with network intrusions.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">As active scanning and exploit scripts are in the wild, it is recommended to deploy the mitigation filter for malicious URL requests until the security updates are available \u27a1\ufe0f <a href=\"https:\/\/t.co\/StXksW6OVu\">https:\/\/t.co\/StXksW6OVu<\/a><\/p>\n<p>\u2014 CERT-Bund (@certbund) <a href=\"https:\/\/twitter.com\/certbund\/status\/1216130895863853063?ref_src=twsrc%5Etfw\">January 11, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preservec76122629148466b854e81e6a330f981\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>German CERT-Bund issued another warning on Saturday about the vulnerability and today refers to the patch delivery dates announced by Citrix (20 &#8211; 31 January 2020). Administrators must therefore take action and use the workaround until these patches are delivered. But it seems that not all admins have been reached yet.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Over 25,000 Citrix (NetScaler) endpoints vulnerable to CVE-2019-19781 (via <a href=\"https:\/\/twitter.com\/bad_packets?ref_src=twsrc%5Etfw\">@bad_packets<\/a>)<a href=\"https:\/\/t.co\/Q8BfxZZLHo\">https:\/\/t.co\/Q8BfxZZLHo<\/a> <a href=\"https:\/\/t.co\/BJA7mEtVYM\">pic.twitter.com\/BJA7mEtVYM<\/a><\/p>\n<p>\u2014 Catalin Cimpanu (@campuscodi) <a href=\"https:\/\/twitter.com\/campuscodi\/status\/1216299336415485952?ref_src=twsrc%5Etfw\">January 12, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserve81b03cdbab8b4a5f87aa9cd4d9d6efdc\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>Catalin Cimpanu points out in the above tweet that more than 25,000 Citrix ADC (NetScaler) endpoints relating to CVE-2019-19781 are vulnerable.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">We've just released a scanner that checks to see if a server is vulnerable for CVE-2019-19781.<\/p>\n<p>It does not actually exploit the target and is erfectly safe with no impact on the system.<a href=\"https:\/\/twitter.com\/hashtag\/TrustedSec?src=hash&amp;ref_src=twsrc%5Etfw\">#TrustedSec<\/a><a href=\"https:\/\/t.co\/bjevUtdLZ0\">https:\/\/t.co\/bjevUtdLZ0<\/a> <a href=\"https:\/\/t.co\/MucHDih6QK\">pic.twitter.com\/MucHDih6QK<\/a><\/p>\n<p>\u2014 TrustedSec (@TrustedSec) <a href=\"https:\/\/twitter.com\/TrustedSec\/status\/1216008463836504072?ref_src=twsrc%5Etfw\">January 11, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preserve472c34f212ef4593b168770666a9106e\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>The above tweet indicates that TrustSec has released a scanner on GitHub that allows administrators to check if a server is vulnerable to attack via the CVE-2019-19781 vulnerability.<\/p>\n<p><strong>Addendum:<\/strong> In the following tweet, security researcher Kevin Beaumont points out a blog post by FireEye.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">FireEye blog about <a href=\"https:\/\/twitter.com\/hashtag\/Shitrix?src=hash&amp;ref_src=twsrc%5Etfw\">#Shitrix<\/a> exploits, hitting multiple industries. <a href=\"https:\/\/t.co\/MaWWg4Pzmq\">https:\/\/t.co\/MaWWg4Pzmq<\/a><\/p>\n<p>\u2014 Kevin Beaumont (@GossiTheDog) <a href=\"https:\/\/twitter.com\/GossiTheDog\/status\/1217238241948192768?ref_src=twsrc%5Etfw\">January 15, 2020<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>FireEye describes how and which attacks are made on industrial networks to exploit the Shirtrix vulnerability.<\/p>\n<h2>Ouch: FreeBSD 8.4 (with EOL 1.8.2015)<\/h2>\n<p>The hair of some Citrix NetScaler admins might have turned even more grey. At the weekend I came across this tweet that sheeds light into how vendors maintain their products:<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Did you know that Citrix ADC (including 13.x) is running on an unspported version of FreeBSD? FreeBSD 8.4 was already EOL on August 1,2015. <a href=\"https:\/\/twitter.com\/hashtag\/ADC?src=hash&amp;ref_src=twsrc%5Etfw\">#ADC<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/FreeBSD?src=hash&amp;ref_src=twsrc%5Etfw\">#FreeBSD<\/a> <a href=\"https:\/\/t.co\/0pICToTQet\">pic.twitter.com\/0pICToTQet<\/a><\/p>\n<p>\u2014 Julian Mooren (@citrixguyblog) <a href=\"https:\/\/twitter.com\/citrixguyblog\/status\/1215918428847996928?ref_src=twsrc%5Etfw\">January 11, 2020<\/a><\/p><\/blockquote>\n<p><span id=\"preservecd8d30aac8ec4f3384eafbb9ffccc430\" class=\"wlWriterPreserve\"><script src=\"https:\/\/platform.twitter.com\/widgets.js\" async=\"\" charset=\"utf-8\"><\/script><\/span><\/p>\n<p>Currently Julian is still waiting for an answer from Citix, but that's not funny at all \u2013 imho.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2019\/12\/24\/schwachstelle-in-citrix-produkten-gefhrdet-firmen-netzwerke\/\">Vulnerability in Citrix Apps put companies at risk<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/13\/poc-for-citrix-adc-netscaler-vulnerability-cve-2019-19781\/\">PoC for Citrix ADC\/Netscaler vulnerability CVE-2019-19781<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/17\/further-actions-required-for-citrix-netscaler-vulnerability\/\">Further actions required for Citrix Netscaler vulnerability<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2020\/01\/20\/citrix-adc-netscaler-patches-11-1-12-0-released-01-19-2020\/\" rel=\"bookmark\">Citrix ADC\/Netscaler patches 11.1\/12.0 released (01\/19\/2020)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]There is an unpatched vulnerability CVE-2019-19781 in Citrix ADC (Application Delivery Controller, formerly Netscaler) and proof of concept (PoC) exploits have been available for a few days to exploit the vulnerability &#8211; and honeypots are already under attack. I got &hellip; <a href=\"https:\/\/borncity.com\/win\/2020\/01\/13\/poc-for-citrix-adc-netscaler-vulnerability-cve-2019-19781\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[448,580,1547],"tags":[2222,1309,69,1544],"class_list":["post-12582","post","type-post","status-publish","format-standard","hentry","category-devices","category-security","category-software","tag-citrix","tag-network","tag-security","tag-software"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/12582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=12582"}],"version-history":[{"count":1,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/12582\/revisions"}],"predecessor-version":[{"id":35417,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/12582\/revisions\/35417"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=12582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=12582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=12582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}