POC详情: a15586d56e43a874af9e38d274ba1158868a376b

来源
关联漏洞
标题: Citrix NetScaler ADC和Citrix NetScaler Gateway 安全漏洞 (CVE-2025-5777)
描述:Citrix NetScaler ADC和Citrix NetScaler Gateway都是美国Citrix公司的产品。Citrix NetScaler ADC是一个应用程序交付和安全性平台。Citrix NetScaler Gateway是一种安全远程访问的解决方案。 Citrix NetScaler ADC和Citrix NetScaler Gateway存在安全漏洞,该漏洞源于NetScaler Management Interface输入验证不足,可能导致内存过度读取。
描述
Citrix Bleed 2 PoC Scanner (CVE-2025-5777)
介绍
# Citrix Bleed 2 PoC Scanner (CVE-2025-5777)

This script is a Proof-of-Concept (PoC) scanner for the hypothetical vulnerability "Citrix Bleed 2" (CVE-2025-5777). It is designed to detect potential memory leaks from Citrix ADC devices by sending oversized requests and analyzing the responses for sensitive information.

## Features

- **Multiple Test Methods**: Supports `oversized-headers`, `oversized-body`, and `randomized` testing methods.
- **Differential Analysis**: Compares test responses against a baseline to identify leaked data.
- **High-Confidence Token Extraction**: Uses regex and entropy analysis to find potential tokens (e.g., session cookies, JWTs).
- **Multiple Export Formats**: Can export findings to JSON, CSV, or raw text files.
- **Configurable**: Allows setting the number of requests, delay, and other options.

## Installation

1.  **Clone the repository:**
    ```bash
    git clone https://github.com/your-username/citrix-bleed-2-scanner.git
    cd citrix-bleed-2-scanner
    ```

2.  **Install dependencies:**
    ```bash
    pip install -r requirements.txt
    ```
    *(Note: You will need to create a `requirements.txt` file containing `requests`)*

## Usage

```bash
python citrix_bleed_2_scanner.py --target <TARGET_URL> [OPTIONS]
```

### Examples

-   **Basic scan:**
    ```bash
    python citrix_bleed_2_scanner.py --target https://192.168.1.100
    ```

-   **Loop with a delay:**
    ```bash
    python citrix_bleed_2_scanner.py --target https://192.168.1.100 --loop 10 --delay 5
    ```

-   **Use a specific test method and export to JSON:**
    ```bash
    python citrix_bleed_2_scanner.py --target https://192.168.1.100 --test-method oversized-body --json-out results.json
    ```

### Options

| Option              | Description                                                              | Default      |
| ------------------- | ------------------------------------------------------------------------ | ------------ |
| `--target`          | Target URL (e.g., `https://192.168.1.100`)                               | **Required** |
| `--loop`            | Number of requests to send                                               | `1`          |
| `--delay`           | Delay between requests in seconds                                        | `2.0`        |
| `--test-method`     | The testing method to use (`randomized`, `oversized-headers`, `oversized-body`) | `randomized` |
| `--json-out`        | Export found tokens to a JSON file                                       | `None`       |
| `--csv-out`         | Export found tokens to a CSV file                                        | `None`       |
| `--raw-out`         | Export raw response content to a file                                    | `None`       |
| `--no-insecure`     | Enable TLS certificate verification                                      | `disabled`   |


## Legal Disclaimer

This script is provided for educational and authorized security testing purposes only. By using this script, you agree that you will only use it on systems for which you have explicit, written permission to test. The author and contributors are not responsible for any misuse or damage caused by this script. Unauthorized scanning of systems is illegal and strictly prohibited.
文件快照

[4.0K] /data/pocs/a15586d56e43a874af9e38d274ba1158868a376b ├── [ 12K] citrix_bleed_2_scanner.py ├── [3.2K] README.md └── [ 8] requirements.txt 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。