This Metasploit module exploits a directory traversal vulnerability (CVE-2019-19781) within Citrix ADC (NetScaler). It requests the smb.conf file located in the /vpns/cfg directory by issuing the request /vpn/../vpns/cfg/smb.conf. It then checks if the server is vulnerable by looking for the presence of a "[global]" directive in smb.conf, which this file should always contain.
cae093835ce24d0d662704bd016af7d61ceec7e3b179d104173227cfd5c4732f
This is an nmap nse script to test for the path traversal vulnerability in Citrix Application Delivery Controller (ADC) and Gateway.
078997b326852f40549231510ea278d6e98e39608b88703f2a45f6a9734b1d28
This Metasploit module exploits a directory traversal in Citrix Application Delivery Controller (ADC), aka NetScaler, and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0, to execute an arbitrary command payload.
0f0c8e65ca7fee56037d7ddffc1e77aeffb0987b8111f2b772dbffe0b1b1fb89
This Metasploit module exploits a remote code execution vulnerability in Citrix Application Delivery Controller and Gateway version 10.5.
bec68a9167966887bfc41632126f3582e09608bebf23999be1ca53bae2414759
Citrix Application Delivery Controller and Citrix Gateway directory traversal remote code execution exploit.
58fc2672000bf17d12588526d12ca1207500f1e227f4abda50e070491b0d9866
Citrix Application Delivery Controller and Citrix Gateway remote code execution proof of concept exploit.
a478cf3ef59e8055d4d74c4d106b3ad452dedc740043528288bc4f6c8077e649