-
Notifications
You must be signed in to change notification settings - Fork 128
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The test results are not accurate #15
Comments
Are you running the latest versions of the scanner and exploit? I've been testing it on over 10,000 systems and have test cases up for every instance of ADC. Works as intended. |
root@stronghold-nix:/home/relik/Desktop/git/cve-2019-19781# ./citrixmash.py 8889 8080 Citrixmash v0.1 - Exploits the Citrix Directory Traversal Bug: CVE-2019-19781 This tool exploits a directory traversal bug within Citrix ADC (NetScalers) which calls a perl script that is used Be sure to cleanup these two file locations: IP Addresses and DNS names are usable in the victim address and attacker_listener fields (if host supports DNS). Usage: python3 citrixmash.py <attackerip_listener> <attacker_port> [] Firing STAGE1 POST request to create the XML template exploit to disk... |
The result of cve-2019-19781_scanner.py is still vulnerable but citrixmash.py is not successful.I tried many
The text was updated successfully, but these errors were encountered: