近期,外网黑客组织公开了利用XSS漏洞攻击Citrix ADC (NetScaler)/Citrix Gateway的代码和执行方法。目前与此问题相关的漏洞为:
- CVE-2023-24488
在此之前,Citrix已于5月在官网发布了针对这一问题的官方说明和软件修复版本。
目前受此漏洞影响的Citrix产品如下:
- Citrix ADC and Citrix Gateway 13.1 before 13.1-45.61
- Citrix ADC and Citrix Gateway 13.0 before 13.0-90.11
- Citrix ADC and Citrix Gateway 12.1 before 12.1-65.35
- Citrix ADC 12.1-FIPS before 12.1-55.296
- Citrix ADC 12.1-NDcPP before 12.1-55.296
注:用户独立部署的Citrix ADC (NetScaler)/Citrix Gateway产品受此漏洞影响,若用户采用Citrix Cloud服务,则不在此漏洞影响范围内。
相关漏洞说明如下:
漏洞编号 | 描述 | 触发条件 |
CVE-2023-24488 | Cross site scripting | 设备必须配置启用安全网关功能 (SSL VPN, ICA Proxy, CVPN, RDP Proxy) 或者使用AAA virtual server |
CVE-2023-24487 | Arbitrary file read | 有 NSIP 或者 SNIP 管理端口接入权限 |
对于受此漏洞影响的用户,Citrix建议您第一时间更新安装Citrix ADC (NetScaler)/Citrix Gateway 软件版本至指定修复版本:
- Citrix ADC and Citrix Gateway 13.1-45.61 and later releases
- Citrix ADC and Citrix Gateway 13.0-90.11 and later releases of 13.0
- Citrix ADC and Citrix Gateway 12.1-65.35 and later releases of 12.1
- Citrix ADC 12.1-FIPS 12.1-55.296 and later releases of 12.1-FIPS
- Citrix ADC 13.1-FIPS 13.1-37.150 and later releases of 13.1-FIPS
- Citrix ADC 12.1-NDcPP 12.1-55.296 and later releases of 12.1-NDcPP
Citrix将持续关注影响用户安全的潜在事件并在官方Citrix Knowledge Center 更新针对所有安全漏洞的最新说明,详见连接:https://support.citrix.com/securitybulletins
转载:本文转自Citrix Partner微信公众号
![图片[1]-Citrix ADC\NetScaler\Gateway XSS漏洞CVE-2023-24488[信息安全]-技术小站](https://blog.hfly.cc/wp-content/uploads/2023/07/b7066bf3a2140230.png)
THE END
暂无评论内容