CVE-2019-19781

Scores

EPSS

0.944High94.4%
0%20%40%60%80%100%

Percentile: 94.4%

CVSS

9.8Critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-22

Related Vulnerabilities

Exploits

Exploit ID: CVE-2019-19781

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 47901

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47901

Exploit ID: 47913

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47913

Exploit ID: 47930

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47930

Recommendations

Source: nvd

Apply an updateCitrix has released updates in Security Bulletin CTX267027. The updated software is designed to prevent unauthenticated attackers from accessing certain web server features. If updates are unavailable for your platform, or if you are otherwise unable to apply updates, please consider the following workarounds:Block the handling of specially-crafted requestsCitrix article CTX267679 contains several mitigation options for this vulnerability, depending on what type of product installation is used. For example, on a stand-alone system, the following commands are reported to mitigate this vulnerability:nable ns feature responderadd responder action respondwith403 respondwith “\“HTTP/1.1 403 Forbidden\r\r\add responder policy ctx267027 “HTTP.REQ.URL.DECODE_USING_TEXT_MODE.CONTAINS(\”/vpns/\“) && (!CLIENT.SSLVPN.IS_SSLVPN || HTTP.REQ.URL.DECODE_USING_TEXT_MODE.CONTAINS(\”/../\“))” respondwith403bind responder global ctx267027 1 END -type REQ_OVERRIDEsave config shell nsapimgr_wr.sh -ys skip_systemaccess_policyeval=0shell “echo ‘nsapimgr_wr.sh -ys skip_systemaccess_policyeval=0’ >> /nsconfig/rc.netscaler”rebootNote that other configurations, such as CLIP, and HA, the steps to mitigate this vulnerability may be different. Please see CTX267679 for more details.Also note that the above mitigation does not work on Citrix ADC Release 12.1 builds before 51.1651.19 and 50.31, due to an altogether different bug. Release 12.1 users are recommended to update to an unaffected build and also apply mitigations for protection.

URL: https://www.kb.cert.org/vuls/id/619785

Vulnerable Software (3)

Type: Configuration

Vendor: citrix

Product: application_delivery_controller_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:citrix:application_delivery_controller_firmware:10.5:*:*:*:*:*:*:*",
          "vulnerable": true
        },
   ...

Source: nvd

Type: Configuration

Vendor: citrix

Product: gateway_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:citrix:gateway_firmware:13.0:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "...

Source: nvd

Type: Configuration

Vendor: citrix

Product: netscaler_gateway_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:citrix:netscaler_gateway_firmware:10.5:*:*:*:*:*:*:*",
          "vulnerable": true
        },
        {
       ...

Source: nvd