关联漏洞
标题:
Citrix Systems Citrix Gateway和Citrix ADC 跨站脚本漏洞
(CVE-2023-24488)
描述:Citrix Systems Citrix Gateway(Citrix Systems NetScaler Gateway)和Citrix ADC都是美国思杰系统(Citrix Systems)公司的产品。Citrix Gateway是一套安全的远程接入解决方案。该产品可为管理员提供应用级和数据级管控功能,以实现用户从任何地点远程访问应用和数据。Citrix ADC是一个最全面的应用程序交付和负载平衡解决方案。用于实现应用程序安全性、整体可见性和可用性。 Citrix ADC 和 Citrix Gate
描述
CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.
介绍
# CVE-2023-24488
CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.
# Script Details:
he script requires the HTTParty library, which helps in sending HTTP requests.
The check_cve_2023_24488 function is defined, which takes a url parameter to specify the target URL.
The path variable is defined, which contains the exploit string for the CVE-2023-24488 vulnerability.
A GET request is sent using HTTParty to the target URL along with the pre-defined path.
The server's response is examined to verify if the vulnerability is exploited or not. This is done by checking the presence of the <script>alert(document.domain)</script> string in the response body, verifying that the response header contains "content-type: text/html", and checking that the response code is 302.
If the vulnerability is detected in the target URL, it prints "Vulnerable to CVE-2023-24488: Citrix Gateway and Citrix ADC - Cross-Site Scripting."
If the vulnerability is not detected in the target URL, it prints "Not vulnerable to CVE-2023-24488."
The script is used to scan a specific website (in this case, https://example.com/) to check if it is vulnerable to the CVE-2023-24488 exploit. You can change the target URL by modifying the value of target_url in the script.
# CVE Details
[Click Here For CVE Details](https://vuldb.com/?id.228783)
文件快照
[4.0K] /data/pocs/25e67087c990b6653b63e9aadbffa7d2f5396c2d
├── [ 681] CVE-2023-24488.rb
└── [1.4K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。