# NetScaler ADC 和 NetScaler Gateway - 足够的输入验证导致内存溢出读取
## 概述
NetScaler 配置为网关(VPN 虚拟服务器、ICA 代理、CVPN、RDP 代理)或 AAA 虚拟服务器时,由于输入验证不足,存在内存过度读取漏洞。
## 影响版本
未提供具体版本信息。
## 细节
当 NetScaler 作为网关(包括 VPN 虚拟服务器、ICA 代理、CVPN、RDP 代理)或 AAA 虚拟服务器进行配置时,由于输入验证不充分,攻击者可以利用此漏洞进行内存过度读取攻击,从而导致信息泄露。
## 影响
此漏洞可能导致敏感信息泄露,使未经授权的用户能够访问受保护的数据。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-5777.yaml | POC详情 |
2 | 详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件 | https://github.com/mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC- | POC详情 |
3 | CitrixBleed-2 (CVE-2025-5777) – proof-of-concept exploit for NetScaler ADC/Gateway “memory bleed” | https://github.com/RickGeex/CVE-2025-5777-CitrixBleed | POC详情 |
4 | CitrixBleed2 poc | https://github.com/idobarel/CVE-2025-5777 | POC详情 |
5 | Memory disclosure vulnerability in Citrix NetScaler ADC and Gateway when configured as a Gateway (VPN virtual server, ICA proxy, CVPN, RDP Proxy). | https://github.com/nocerainfosec/cve-2025-5777 | POC详情 |
6 | Citrix Bleed 2 PoC Scanner (CVE-2025-5777) | https://github.com/RaR1991/citrix_bleed_2 | POC详情 |
7 | CitrixBleed-2 Checker & Poc automatic exploit and check token. | https://github.com/orange0Mint/CitrixBleed-2-CVE-2025-5777 | POC详情 |
8 | CitrixBleed 2 (CVE-2025-5777) | https://github.com/Chocapikk/CVE-2025-5777 | POC详情 |
9 | CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices | https://github.com/win3zz/CVE-2025-5777 | POC详情 |
10 | CitrixBleed2 powershell version | https://github.com/FrenzisRed/CVE-2025-5777 | POC详情 |
11 | CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2) | https://github.com/bughuntar/CVE-2025-5777 | POC详情 |
12 | Citrix NetScaler Memory Leak PoC | https://github.com/0xgh057r3c0n/CVE-2025-5777 | POC详情 |
13 | CVE-2025-5777 (CitrixBleed 2) - [Citrix NetScaler ADC] [Citrix Gateway] | https://github.com/SleepNotF0und/CVE-2025-5777 | POC详情 |
14 | An advanced, powerful, and easy-to-use tool designed to detect and exploit CVE-2025-5777 (CitrixBleed 2). This script not only identifies the vulnerability but also helps in demonstrating its impact by parsing human-readable information from the memory leak. | https://github.com/cyberleelawat/ExploitVeer | POC详情 |
15 | CVE-2025-5777 | https://github.com/B1ack4sh/Blackash-CVE-2025-5777 | POC详情 |
16 | PoC for CVE-2025-5777 – Auth Bypass and RCE in Trend Micro Apex Central | https://github.com/Shivshantp/CVE-2025-5777-TrendMicro-ApexCentral-RCE | POC详情 |
17 | None | https://github.com/rob0tstxt/POC-CVE-2025-5777 | POC详情 |
18 | CitrixBleed 2 NetScaler honeypot logs | https://github.com/below0day/Honeypot-Logs-CVE-2025-5777 | POC详情 |
19 | None | https://github.com/soltanali0/CVE-2025-5777-Exploit | POC详情 |
暂无评论