Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-24488 PoC — Citrix Systems Citrix Gateway和Citrix ADC 跨站脚本漏洞

Source
Associated Vulnerability
Title:Citrix Systems Citrix Gateway和Citrix ADC 跨站脚本漏洞 (CVE-2023-24488)
Description:Citrix Systems Citrix Gateway(Citrix Systems NetScaler Gateway)和Citrix ADC都是美国思杰系统(Citrix Systems)公司的产品。Citrix Gateway是一套安全的远程接入解决方案。该产品可为管理员提供应用级和数据级管控功能,以实现用户从任何地点远程访问应用和数据。Citrix ADC是一个最全面的应用程序交付和负载平衡解决方案。用于实现应用程序安全性、整体可见性和可用性。 Citrix ADC 和 Citrix Gate
Description
CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.
Readme
# CVE-2023-24488
CVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.

# Script Details:

he script requires the HTTParty library, which helps in sending HTTP requests.
The check_cve_2023_24488 function is defined, which takes a url parameter to specify the target URL.
The path variable is defined, which contains the exploit string for the CVE-2023-24488 vulnerability.
A GET request is sent using HTTParty to the target URL along with the pre-defined path.
The server's response is examined to verify if the vulnerability is exploited or not. This is done by checking the presence of the <script>alert(document.domain)</script> string in the response body, verifying that the response header contains "content-type: text/html", and checking that the response code is 302.
If the vulnerability is detected in the target URL, it prints "Vulnerable to CVE-2023-24488: Citrix Gateway and Citrix ADC - Cross-Site Scripting."
If the vulnerability is not detected in the target URL, it prints "Not vulnerable to CVE-2023-24488."
The script is used to scan a specific website (in this case, https://example.com/) to check if it is vulnerable to the CVE-2023-24488 exploit. You can change the target URL by modifying the value of target_url in the script.


# CVE Details
[Click Here For CVE Details](https://vuldb.com/?id.228783)
File Snapshot

[4.0K] /data/pocs/25e67087c990b6653b63e9aadbffa7d2f5396c2d ├── [ 681] CVE-2023-24488.rb └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.