2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-8245" ,
"sourceIdentifier" : "support@hackerone.com" ,
"published" : "2020-09-18T21:15:13.170" ,
2024-11-23 13:10:58 +00:00
"lastModified" : "2024-11-21T05:38:34.877" ,
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Improper Input Validation on Citrix ADC and Citrix Gateway 13.0 before 13.0-64.35, Citrix ADC and NetScaler Gateway 12.1 before 12.1-58.15, Citrix ADC 12.1-FIPS before 12.1-55.187, Citrix ADC and NetScaler Gateway 12.0, Citrix ADC and NetScaler Gateway 11.1 before 11.1-65.12, Citrix SD-WAN WANOP 11.2 before 11.2.1a, Citrix SD-WAN WANOP 11.1 before 11.1.2a, Citrix SD-WAN WANOP 11.0 before 11.0.3f, Citrix SD-WAN WANOP 10.2 before 10.2.7b leads to an HTML Injection attack against the SSL VPN web portal."
} ,
{
"lang" : "es" ,
"value" : "Una Comprobaci\u00f3n de Entrada inapropiada en Citrix ADC y Citrix Gateway versiones 13.0 anteriores a 13.0-64.35, Citrix ADC y NetScaler Gateway versiones 12.1 anteriores a 12.1-58.15, Citrix ADC versiones 12.1-FIPS anteriores a 12.1-55.187, Citrix ADC y NetScaler Gateway versi\u00f3n 12.0, Citrix ADC y NetScaler Gateway 11.1 antes 11.1-65.12, Citrix SD-WAN WANOP versiones 11.2 anteriores a 11.2.1a, Citrix SD-WAN WANOP versiones 11.1 anteriores a 11.1.2a, Citrix SD-WAN WANOP versiones 11.0 anteriores a 11.0.3f, Citrix SD-WAN WANOP versiones 10.2 anteriores a 10.2.7b, conlleva a un ataque de Inyecci\u00f3n HTML contra el portal web SSL VPN"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 6.1 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.7
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:N/I:P/A:N" ,
2024-11-23 13:10:58 +00:00
"baseScore" : 4.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 13:10:58 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
2024-11-23 13:10:58 +00:00
"source" : "support@hackerone.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
} ,
{
2024-11-23 13:10:58 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.1" ,
"versionEndExcluding" : "11.1-65.12" ,
"matchCriteriaId" : "AD2A238E-72C4-4D74-B902-2EE8E602AAC1"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.1" ,
"versionEndExcluding" : "12.1-58.15" ,
"matchCriteriaId" : "1C991579-B6B8-4F07-9AF9-739452F1F5AA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0" ,
"versionEndExcluding" : "13.0-64.35" ,
"matchCriteriaId" : "ED09F4AE-DCC6-4C7D-BFA1-D22E16893C97"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "80E69E10-6F40-4FE4-9D84-F6C25EAB79D8"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "11.1" ,
"versionEndExcluding" : "11.1-65.12" ,
"matchCriteriaId" : "2F98105E-37A4-46F4-BA82-A8E95372A370"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0" ,
"versionEndExcluding" : "13.0-64.35" ,
"matchCriteriaId" : "178C6CA9-0068-4225-A209-E13A880ED188"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "12.1" ,
"versionEndExcluding" : "12.1-58.15" ,
"matchCriteriaId" : "CFAC08D1-1FE8-4910-9D50-F167537C7C91"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://support.citrix.com/article/CTX281474" ,
"source" : "support@hackerone.com" ,
"tags" : [
"Vendor Advisory"
]
2024-11-23 13:10:58 +00:00
} ,
{
"url" : "https://support.citrix.com/article/CTX281474" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}