cybermaterial.com
Open in
urlscan Pro
35.244.172.81
Public Scan
URL:
https://cybermaterial.com/new-citrix-flaw-exposes-sensitive-data/
Submission: On May 14 via api from US — Scanned from DE
Submission: On May 14 via api from US — Scanned from DE
Form analysis
8 forms found in the DOMGET https://cybermaterial.com/
<form action="https://cybermaterial.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
GET https://cybermaterial.com/
<form action="https://cybermaterial.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
GET https://cybermaterial.com/
<form action="https://cybermaterial.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
POST /new-citrix-flaw-exposes-sensitive-data/#wpcf7-f101133-p126180-o1
<form action="/new-citrix-flaw-exposes-sensitive-data/#wpcf7-f101133-p126180-o1" method="post" class="wpcf7-form init" aria-label="Contact form" novalidate="novalidate" data-status="init">
<div style="display: none;">
<input type="hidden" name="_wpcf7" value="101133">
<input type="hidden" name="_wpcf7_version" value="5.9.3">
<input type="hidden" name="_wpcf7_locale" value="en_US">
<input type="hidden" name="_wpcf7_unit_tag" value="wpcf7-f101133-p126180-o1">
<input type="hidden" name="_wpcf7_container_post" value="126180">
<input type="hidden" name="_wpcf7_posted_data_hash" value="">
<input type="hidden" name="_wpcf7_recaptcha_response"
value="03AFcWeA6XbdvZVGx0rAgURH9IurEMAfPncdZkkbADGW_RSacISWwPsU5JpY5x6gOiApYfN0LkpqfggrCgUjZCximeyjW6O-ls9bG3RkAbNDs71_cv2sKEnf4LV9XQ44agyUrjebsitWYjdvDK7dwnEHqNp8fdEAxyek60FdkAkMJSxisCumktv72NlwoXKgIAyftB1VRiTLiQEjVNxIUQniybE3duUoVUeIP0KHvnBzk8vp4TbAH7vN4ZCU9pmUWOxmL0WrWietW_ts_kqRfmVbNggS4OPOkIzP-D5MUNcISDm7vUSn0atRTaKYGUAkFBRdUFlxl_DxSitzxNnE-Ixlht7Z1kUHC9JDZO-hfIIWeXea8Bi7T-taZPMr2dJG1n75O4lj3GwZ_woHMAPNuYBeCf4q8xRjdrgln6zm9DScpHcO6QznCZCMpvE87LTtUhZfgzgMEd2ndS7Ywgfnd5se5wh_uPKgJY7_RBYc-FATXYCTwEwxIgIbmjvNXtA3haYZF2XRpexCsyrGJFt3PrUmWJMwKnJgrR_zyQ0IM2ou-ss_tuR9SXFswlbJzQ-bJHM8EDNGHrS9PS-CnK9jfV9QzbUwBiNavK73UgQ3YNLm2NzA-q-lWoNB2tkrRjCKcG4iuz3jW4wDYuq0n1L9vVL9aEp_LYMuRJQJxLCAgUmTuVhC3xpTL9WtS6hIqS9PSVdx515JomG15A24hBOCtZANKsut3ku4NK0dEWGVPDX-tB3fwY3cbTt3iVIXm6u2j3kJg97VM3WnO9rskCCvUnmmilW7f4pUMv4hHaW5HMc8iIQooWMxJHAdFMT5Yq5leNlKHh-7PB5FJ1YcIabrV-eYJ_gYC_QJ1lwaleOt72oNILvA1Hs8U1qoz-ce8sPQ6YB8DUe-ad-RzP15dCVCs80Npm8vpRdqslMvI-RU603uHVvZshfobk0U1EwG1Ies3XI_Xt1xRARKwtbUnaQcya_43PmvWEbNxXF9D0ldFF_8esdKnampVHwDJ6ZYvW_HvSnigFJ8QnQfRUyCKF_j121UVsTeP7TU73Sh_dNn3LF515Iu4BgtGOmHbbxBKvLFl1nYaRo3VHvxqJLBUkB2-G4yYauDx2usQmTgqwmg901FsjqctxFc40OP-WoKDfjCn5vSmm4asKEN2jDIy6mPyKaQHQv5-9su8nblmpfG6XQ5koL0O81BFD7icqwhjMPoZuG3NjR8NGN8xzXr3AUd9sIy3WXpWegg_q8EIlW8CX5ls3sqb6sjKrGWx9uhXUHhKgx656DdrqNBpFE8v_DqBJDm9x610RduscPpgY3BKXAF6ps5r19BykNbi139yhxm_CG_T-cJr8Cp_seDPm10OlXZpWaTbwgSPX0spjvsncNNX6owdZoksXUr-LYpe8mvaaoEGuISXndaRtAE7L4IYV3vXYo39FrrvbpmfESIJGpDfNjNv107GromlEQ0covODidpuPaeB0g_dOC0hb9AMHNVV3vFqu-6RkATleByPZDPrYR1XBB1FqMZX6ZnwzyWxLCtiCVoRyVVuwF8v7omERrGzFRXEG9VqH0uAR-bHz-xKT-pghbHnldnqy08La6d7DNstZ4s2R7-bS6gKQtKaEhfvAW9qhoVFYM3bpSvZIM4JkGfKUXZe_Ap-94zDNrE2iGeta3bWeIU3CAtHfi2y2DiVa6mj4CpReUw">
</div>
<p><label><br>
<span class="wpcf7-form-control-wrap" data-name="your-email"><input size="40" class="wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email" autocomplete="email" aria-required="true" aria-invalid="false"
placeholder="Your email" value="" type="email" name="your-email"></span> </label>
</p>
<p><label><span class="wpcf7-form-control-wrap" data-name="TermsConditions"><span class="wpcf7-form-control wpcf7-acceptance"><span class="wpcf7-list-item"><label><input type="checkbox" name="TermsConditions" value="1" aria-invalid="false"><span
class="wpcf7-list-item-label">I accept the <a href="https://cybermaterial.com/legal-and-privacy-policy/"> Terms & Conditions* </a></span></label></span></span></span> </label>
</p>
<p><input class="wpcf7-form-control wpcf7-submit has-spinner" type="submit" value="Subscribe" disabled=""><span class="wpcf7-spinner"></span>
</p>
<div class="wpcf7-response-output" aria-hidden="true"></div>
</form>
GET https://cybermaterial.com/
<form action="https://cybermaterial.com/" method="get" class="jeg_search_form" target="_top">
<input name="s" class="jeg_search_input" placeholder="Search..." type="text" value="" autocomplete="off">
<button aria-label="Search Button" type="submit" class="jeg_search_button btn"><i class="fa fa-search"></i></button>
</form>
POST #
<form action="#" data-type="login" method="post" accept-charset="utf-8">
<h3>Welcome Back!</h3>
<p>Login to your account below</p>
<!-- Form Messages -->
<div class="form-message"></div>
<p class="input_field">
<input type="text" name="username" placeholder="Username" value="">
</p>
<p class="input_field">
<input type="password" name="password" placeholder="Password" value="">
</p>
<p class="input_field remember_me">
<input type="checkbox" id="remember_me" name="remember_me" value="true">
<label for="remember_me">Remember Me</label>
</p>
<p class="submit">
<input type="hidden" name="action" value="login_handler">
<input type="hidden" name="jnews_nonce" value="5aa5196aa7">
<input type="submit" name="jeg_login_button" class="button" value="Log In" data-process="Processing . . ." data-string="Log In">
</p>
<div class="bottom_links clearfix">
<a href="#jeg_forgotform" class="jeg_popuplink forgot">Forgotten Password?</a>
</div>
</form>
POST #
<form action="#" data-type="forgot" method="post" accept-charset="utf-8">
<h3>Retrieve your password</h3>
<p>Please enter your username or email address to reset your password.</p>
<!-- Form Messages -->
<div class="form-message"></div>
<p class="input_field">
<input type="text" name="user_login" placeholder="Your email or username" value="">
</p>
<div class="g-recaptcha" data-sitekey=""></div>
<p class="submit">
<input type="hidden" name="action" value="forget_password_handler">
<input type="hidden" name="jnews_nonce" value="5aa5196aa7">
<input type="submit" name="jeg_login_button" class="button" value="Reset Password" data-process="Processing . . ." data-string="Reset Password">
</p>
<div class="bottom_links clearfix">
<a href="#jeg_loginform" class="jeg_popuplink"><i class="fa fa-lock"></i> Log In</a>
</div>
</form>
POST #
<form action="#" method="post" accept-charset="utf-8">
<h3>Add New Playlist</h3>
<!-- Form Messages -->
<div class="form-message"></div>
<div class="form-group">
<p class="input_field">
<input type="text" name="title" placeholder="Playlist Name" value="">
</p>
<p class="input_field">
<select name="visibility">
<option disabled="" selected="selected" value="">- Select Visibility -</option>
<option value="public">Public</option>
<option value="private">Private</option>
</select>
</p>
<!-- submit button -->
<div class="submit">
<input type="hidden" name="type" value="create_playlist">
<input type="hidden" name="action" value="playlist_handler">
<input type="hidden" name="post_id" value="">
<input type="hidden" name="jnews-playlist-nonce" value="6c7d11d07a">
<input type="submit" name="jeg_save_button" class="button" value="Save" data-process="Processing . . ." data-string="Save">
</div>
</div>
</form>
Text Content
We value your privacy We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Customize Reject All Accept All Customize Consent Preferences We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below. The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... Show more NecessaryAlways Active These cookies are strictly necessary for your website to properly function, and therefore cannot be disabled by your users. * Cookie _GRECAPTCHA * Duration 90 days * Description Stores a value used to verify that the user is not a bot * Cookie rc::f * Duration 180 days * Description Used to track and analyze user behavior to distinguish humans from bots or automated software. * Cookie rc::a * Duration 180 days * Description Used to track and analyze user behavior to distinguish humans from bots or automated software * Cookie _grecaptcha * Duration 180 days * Description Stores a value used to verify that the user is not a bot Functional Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features. * Cookie yt-remote-device-id * Duration 180 days * Description Stores a unique ID for the user's device for YouTube * Cookie yt-remote-connected-devices * Duration 180 days * Description Stores a list of connected devices for YouTube * Cookie ytidb::LAST_RESULT_ENTRY_KEY * Duration 180 days * Description Stores the last result entry key used by YouTube Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc. * Cookie _ga_# * Duration 180 days * Description Used to distinguish individual users by means of designation of a randomly generated number as client identifier, which allows calculation of visits and sessions * Cookie _ga * Duration 180 days * Description Records a particular ID used to come up with data about website usage by the user * Cookie _clck * Duration 180 days * Description Persists the Clarity User ID and preferences, unique to that site is attributed to the same user ID * Cookie _clsk * Duration 180 days * Description Connects multiple page views by a user into a single Clarity session recording * Cookie CLID * Duration 180 days * Description Identifies the first-time Clarity saw this user on any site using Clarity * Cookie MUID * Duration 3 years * Description Sets a unique user id for tracking how the user uses the site. Persistent cookie that is saved for 3 years Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. * Cookie MR * Duration 180 days * Description This cookie is used by Microsoft to reset or refresh the MUID cookie. * Cookie yt-remote-device-id * Duration 180 days * Description Stores a unique ID for the user's device for YouTube * Cookie yt-remote-connected-devices * Duration 180 days * Description Stores a list of connected devices for YouTube * Cookie ytidb::LAST_RESULT_ENTRY_KEY * Duration 180 days * Description Stores the last result entry key used by YouTube * Cookie SM * Duration 180 days * Description Session cookie used to collect anonymous information on how visitors use a site to help improve their experience and for better target ads. Advertisement Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns. * Cookie SRM_B * Duration 180 days * Description Atlast Adserver used in conjunction with Bing services. * Cookie ANONCHK * Duration 180 days * Description Used by Bing as a unique user identifier for users seeing bing ads * Cookie VISITOR_INFO1_LIVE * Duration 180 days * Description YouTube is a Google-owned platform for hosting and sharing videos. YouTube collects user data through videos embedded in websites, which is aggregated with profile data from other Google services in order to display targeted advertising to web visitors across a broad range of their own and other websites. Used by Google in combination with SID to verify Google user account and most recent login time. Reject All Save My Preferences Accept All MENU * Alerts * Incidents * News * APTs * Cyber Decoded * Cyber Hygiene * Cyber Review * Cyber Tips * Definitions * Malware * Threat Actors * Tutorials USEFUL TOOLS * Password generator * Report an incident * Report to authorities No Result View All Result * Education * Cyber Decoded * Definitions * Information * Alerts * Incidents * News * Insights * Cyber Hygiene * Cyber Review * Tips * Tutorials * Support * Contact Us * Report an incident * About * About Us * Advertise with us Get Help * Education * Cyber Decoded * Definitions * Information * Alerts * Incidents * News * Insights * Cyber Hygiene * Cyber Review * Tips * Tutorials * Support * Contact Us * Report an incident * About * About Us * Advertise with us Get Help No Result View All Result No Result View All Result Home Alerts NEW CITRIX FLAW EXPOSES SENSITIVE DATA May 7, 2024 Reading Time: 3 mins read in Alerts A significant security vulnerability has been identified in Citrix NetScaler ADC and Gateway appliances, potentially allowing unauthorized access to sensitive data. The vulnerability, known as an out-of-bounds memory read issue, has been found in software versions up to 13.1-50.23 and bears similarities to the previously reported CitrixBleed. However, it is considered less severe regarding the sensitivity of the data exposed. This flaw specifically affects configurations commonly used in enterprise environments for secure remote access and traffic management. The issue was brought to light by security experts at Bishop Fox, who determined that the flaw enables remote attackers to exploit the system by sending specially crafted requests to the vulnerable interface. Through this method, attackers could potentially access and leak information like credentials and session tokens found in HTTP request bodies. The vulnerability results from improper handling of the HTTP Host request header by the software’s web interface, which fails to manage memory correctly when dealing with overly long header values. Upon discovering the vulnerability, Citrix acknowledged the issue and has since released updates to address this critical security flaw. The updates, starting from version 13.1-51.15, include fixes designed to mitigate the vulnerability and prevent further exploitation. Citrix has strongly advised all users of the affected versions to update their systems promptly to avoid potential exploitation, as active exploits of this vulnerability have been observed in the wild. This incident highlights the continuous challenges faced in securing network appliances against sophisticated cyber threats. It underscores the importance for organizations to routinely review and update their systems, especially those utilizing older software versions that may be end-of-life. Upgrading to supported versions is crucial not only to address specific vulnerabilities but also to ensure overall system security and compliance with current standards, thereby safeguarding networks against potential data breaches and unauthorized access. REFERENCE: * Critical Security Flaw in Citrix NetScaler Risks Data Leaks Tags: Citrix NetScaler ADCCitrixBleedCyber AlertCyber Alerts 2024Cyber RiskCyber threatGatewayMay 2024 ADVERTISEMENT RELATED POSTS PYTHON MALWARE CONCEALS GOLANG C2 IN LOGO May 13, 2024 NEXT.JS VULNERABILITIES PATCHED May 13, 2024 NORTH KOREAN HACKERS DEPLOY ‘DURIAN’ MALWARE May 13, 2024 APACHE OFBIZ SECURITY RISKS May 13, 2024 CISA ISSUES BLACK BASTA RANSOMWARE ALERT May 13, 2024 SOCGHOLISH MALWARE LURES USERS WITH UPDATES May 10, 2024 LATEST ALERTS NEXT.JS VULNERABILITIES PATCHED NORTH KOREAN HACKERS DEPLOY ‘DURIAN’ MALWARE PYTHON MALWARE CONCEALS GOLANG C2 IN LOGO CISA ISSUES BLACK BASTA RANSOMWARE ALERT APACHE OFBIZ SECURITY RISKS SOCGHOLISH MALWARE LURES USERS WITH UPDATES SUBSCRIBE TO OUR NEWSLETTER I accept the Terms & Conditions* LATEST INCIDENTS CHRISTIE’S CYBERATTACK DISRUPTS AUCTIONS EUROPOL EPE PORTAL BREACH EMBARGO GROUP LEAKS FIRSTMAC DATA LUK FOOK CYBERSECURITY INVESTIGATION ATTACKER RETURNS FUNDS IN BTC SCAM KENNEDY COLLECTIVE DATA BREACH Next Post PHISHING SCAM TARGETS AMEX CARDHOLDERS * About Us * Contact Us * Legal and Privacy Policy * Site Map © 2024 | CyberMaterial | All rights reserved No Result View All Result * Alerts * Incidents * News * Cyber Decoded * Cyber Hygiene * Cyber Review * Definitions * Malware * Cyber Tips * Tutorials * Advanced Persistent Threats * Threat Actors * Report an incident * Password Generator * About Us * Contact Us * Advertise with us Copyright © 2023 CyberMaterial WELCOME BACK! Login to your account below Remember Me Forgotten Password? RETRIEVE YOUR PASSWORD Please enter your username or email address to reset your password. Log In ADD NEW PLAYLIST - Select Visibility -PublicPrivate