Page 7 of 31 results (0.003 seconds)

CVSS: 10.0EPSS: 96%CPEs: 1EXPL: 2

Citrix NetScaler SD-WAN devices through v9.1.2.26.561201 allow remote attackers to execute arbitrary shell commands as root via a CGISESSID cookie. On CloudBridge (the former name of NetScaler SD-WAN) devices, the cookie name was CAKEPHP rather than CGISESSID. Los dispositivos Citrix NetScaler SD-WAN hasta la versión v9.1.2.26.561201 permite a atacantes remotos ejecutar comandos de shell aleatorios como root mediante la cookie CGISESSID. En los dispositivos cloudBridge (el nombre formal de NetScaler SD-WAN), la cookie llamada fue CAKEPHP mas que CGISESSID. A vulnerability has been identified in the management interface of Citrix NetScaler SD-WAN Enterprise and Standard Edition and Citrix CloudBridge Virtual WAN Edition that could result in an unauthenticated, remote attacker being able to execute arbitrary code as a root user. • https://www.exploit-db.com/exploits/42346 https://www.exploit-db.com/exploits/42345 http://www.securityfocus.com/bid/99943 http://www.securitytracker.com/id/1039019 https://support.citrix.com/article/CTX225990 • CWE-20: Improper Input Validation •