Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8300 PoC — Citrix Systems Citrix Application Delivery Controller 安全漏洞

Source
Associated Vulnerability
Title:Citrix Systems Citrix Application Delivery Controller 安全漏洞 (CVE-2020-8300)
Description:Citrix Systems Citrix Application Delivery Controller(ADC)是美国思杰系统(Citrix Systems)公司的一款应用交付控制器。该产品具有应用交付控制和负载均衡等功能。 Citrix Application Delivery Controller 中存在安全漏洞,该漏洞源于 SAML 身份验证劫持通过网络钓鱼攻击可窃取有效用户会话。攻击者可通过该漏洞获得敏感信息。
Description
Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API
Readme

Detect Citrix ADC SAML action or SAML iDP Profile config vulnerable to CVE-2020-8300 using Citrix ADC NITRO API

![image](https://user-images.githubusercontent.com/8889050/122010412-03b58580-cdb3-11eb-9708-9a027d871070.png)


EXAMPLE
& '.\CitrixADC-CVE-2020-8300.ps1' -NSIPProtocol http -NSIP 10.10.10.10 -user nitro -pass "SshhhItsASecret"


If this proves useful to anyone I will develop further with the following functionality:

- Identify bindings for SAML Actions and SAML iDP Profiles to identify if and where they are in use
- Detect vulnerable firmware versions by seeing if the relaystaterule and acsurlrule parameters can be set 
File Snapshot

[4.0K] /data/pocs/710e7b66c1e1d62bbe5d46a07cfe715c7f87da45 ├── [4.1K] CitrixADC-CVE-2020-8300.ps1 └── [ 642] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.