exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ctxpoliciesbypass.txt

ctxpoliciesbypass.txt
Posted Oct 6, 2005
Authored by Gustavo Gurmandi | Site grupoitpro.com.ar

A vulnerability in Citrix Metaframe Presentation Server versions 3.0 and 4.0 allows for users to bypass policy restrictions.

tags | exploit
SHA-256 | 6b9a55689bfeff034be1de217d8057adaeb0238030aeb793f03081eea1819363

ctxpoliciesbypass.txt

Change Mirror Download
DESCRIPTION:
============

Vulnerability in Presentation Server allow to user bypass citrix policy
which is applied to client name.



SOFTWARE: Citrix Metaframe Presentation Server 3.0 / 4.0
=========


INFO:
=====

Citrix Presentation Server policy is used for admins to restrict the user
environment
and these allow applying to: IP client, servers, Users, o Client Name.

When user used the Web Interface to access to application in citrix
environment
the CLIENT NAME used is WI_*, where (*) is a random value like
asdfserw34vc342dk
this extension allow admins to use citrix policy based in client name "WI_*"
This policy can be used to restrict "printing Mapping, Disk Mapping,
Control bandwidth, manage printer driver environment so..."



VULNERABILITY:
==============

When user uses the application in Web interface, he download and execute
automatic file "launch.ica"

If the user "save as" launch.ica in his pc, and edit with notepad
He can change the value in ClientName that another "WI_" and execute

When user connects to citrix with ica file modified to Presentation
Server, the value in clientname is different to the original one and
bypasses the citrix policies.



POC:
====

Here is an example extracted from launch.ica:

[Encoding]

InputEncoding=ISO8859_1

[WFClient]

Version=2

ClientName=WI_XXXX -> change this extension with other name to bypass the
citrix policies

TransportReconnectEnabled=On

RemoveICAFile=yes

ProxyType=None

ProxyTimeout=30000



VENDOR STATUS:
==============

http://support.citrix.com/kb/entry!default.jspa?categoryID=275&externalID=CTX107705


FIX:
====

No Hotfix released


CREDITS:
========

This vulnerability was discovered and researched by
Gustavo Gurmandi of GrupoITPro Security Research Community.



mail : gustavog@grupoiptro.com.ar

web : http://www.grupoitpro.com.ar


ORIGINAL ADVISORY:
==================

http://www.grupoitpro.com.ar/ctxpoliciesbypass.txt



Login or Register to add favorites

File Archive:

August 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    15 Files
  • 2
    Aug 2nd
    22 Files
  • 3
    Aug 3rd
    0 Files
  • 4
    Aug 4th
    0 Files
  • 5
    Aug 5th
    15 Files
  • 6
    Aug 6th
    11 Files
  • 7
    Aug 7th
    43 Files
  • 8
    Aug 8th
    42 Files
  • 9
    Aug 9th
    36 Files
  • 10
    Aug 10th
    0 Files
  • 11
    Aug 11th
    0 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    0 Files
  • 14
    Aug 14th
    0 Files
  • 15
    Aug 15th
    0 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close