Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-3519
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Unauthenticated remote code execution
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Citrix ADC 和 Citrix Gateway 代码注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Citrix Systems Citrix Gateway(Citrix Systems NetScaler Gateway)和Citrix ADC都是美国思杰系统(Citrix Systems)公司的产品。Citrix Gateway是一套安全的远程接入解决方案。该产品可为管理员提供应用级和数据级管控功能,以实现用户从任何地点远程访问应用和数据。Citrix ADC是一个最全面的应用程序交付和负载平衡解决方案。用于实现应用程序安全性、整体可见性和可用性。 Citrix ADC 和 Citrix Gate
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
CitrixNetScaler ADC 13.1 ~ 49.13 -
CitrixNetScaler Gateway 13.1 ~ 49.13 -
II. Public POCs for CVE-2023-3519
#POC DescriptionSource LinkShenlong Link
1Citrix Scanner for CVE-2023-3519https://github.com/telekom-security/cve-2023-3519-citrix-scannerPOC Details
2Accurately fingerprint and detect vulnerable (and patched!) versions of Netscaler / Citrix ADC to CVE-2023-3519https://github.com/securekomodo/citrixInspectorPOC Details
3Nonehttps://github.com/mr-r3b00t/CVE-2023-3519POC Details
4CVE-2023-3519https://github.com/d0rb/CVE-2023-3519POC Details
5nse script to identify server vulnerable to CVE-2023-3519https://github.com/dorkerdevil/CitrixFallPOC Details
6RCE exploit for CVE-2023-3519https://github.com/BishopFox/CVE-2023-3519POC Details
7CVE-2023-3519 vuln for nuclei scannerhttps://github.com/SalehLardhi/CVE-2023-3519POC Details
8NetScaler (Citrix ADC) CVE-2023-3519 Scannerhttps://github.com/KR0N-SECURITY/CVE-2023-3519POC Details
9Nonehttps://github.com/passwa11/CVE-2023-3519POC Details
10Nonehttps://github.com/rwincey/cve-2023-3519POC Details
11Nonehttps://github.com/mandiant/citrix-ioc-scanner-cve-2023-3519POC Details
12Citrix ADC RCE CVE-2023-3519https://github.com/Chocapikk/CVE-2023-3519POC Details
13Script for checking CVE-2023-3519 for Backdoorshttps://github.com/JonaNeidhart/CVE-2023-3519-BackdoorCheckPOC Details
14Stack-Overflow on Citrixhttps://github.com/Mohammaddvd/CVE-2023-3519POC Details
15critical unauthenticated remote code execution (RCE) vulnerability affecting Citrix ADC (NetScaler ADC) and Citrix Gateway appliances configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. Exploitation can lead to arbitrary code execution. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-3519.yamlPOC Details
16Stack-Overflow on Citrixhttps://github.com/dhammerg/CVE-2023-3519POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-3519
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-3519

No comments yet


Leave a comment