Skip to content

Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API

Notifications You must be signed in to change notification settings

stuartcarroll/CitrixADC-CVE-2020-8300

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API

image

EXAMPLE & '.\CitrixADC-CVE-2020-8300.ps1' -NSIPProtocol http -NSIP 10.10.10.10 -user nitro -pass "SshhhItsASecret"

If this proves useful to anyone I will develop further with the following functionality:

  • Identify bindings for SAML Actions and SAML iDP Profiles to identify if and where they are in use
  • Detect vulnerable firmware versions by seeing if the relaystaterule and acsurlrule parameters can be set

About

Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published