Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-5777 PoC — Citrix NetScaler ADC和Citrix NetScaler Gateway 安全漏洞

Source
Associated Vulnerability
Title:Citrix NetScaler ADC和Citrix NetScaler Gateway 安全漏洞 (CVE-2025-5777)
Description:Citrix NetScaler ADC和Citrix NetScaler Gateway都是美国Citrix公司的产品。Citrix NetScaler ADC是一个应用程序交付和安全性平台。Citrix NetScaler Gateway是一种安全远程访问的解决方案。 Citrix NetScaler ADC和Citrix NetScaler Gateway存在安全漏洞,该漏洞源于NetScaler Management Interface输入验证不足,可能导致内存过度读取。
Description
Citrix Bleed 2 PoC Scanner (CVE-2025-5777)
Readme
# Citrix Bleed 2 PoC Scanner (CVE-2025-5777)

This script is a Proof-of-Concept (PoC) scanner for the hypothetical vulnerability "Citrix Bleed 2" (CVE-2025-5777). It is designed to detect potential memory leaks from Citrix ADC devices by sending oversized requests and analyzing the responses for sensitive information.

## Features

- **Multiple Test Methods**: Supports `oversized-headers`, `oversized-body`, and `randomized` testing methods.
- **Differential Analysis**: Compares test responses against a baseline to identify leaked data.
- **High-Confidence Token Extraction**: Uses regex and entropy analysis to find potential tokens (e.g., session cookies, JWTs).
- **Multiple Export Formats**: Can export findings to JSON, CSV, or raw text files.
- **Configurable**: Allows setting the number of requests, delay, and other options.

## Installation

1.  **Clone the repository:**
    ```bash
    git clone https://github.com/your-username/citrix-bleed-2-scanner.git
    cd citrix-bleed-2-scanner
    ```

2.  **Install dependencies:**
    ```bash
    pip install -r requirements.txt
    ```
    *(Note: You will need to create a `requirements.txt` file containing `requests`)*

## Usage

```bash
python citrix_bleed_2_scanner.py --target <TARGET_URL> [OPTIONS]
```

### Examples

-   **Basic scan:**
    ```bash
    python citrix_bleed_2_scanner.py --target https://192.168.1.100
    ```

-   **Loop with a delay:**
    ```bash
    python citrix_bleed_2_scanner.py --target https://192.168.1.100 --loop 10 --delay 5
    ```

-   **Use a specific test method and export to JSON:**
    ```bash
    python citrix_bleed_2_scanner.py --target https://192.168.1.100 --test-method oversized-body --json-out results.json
    ```

### Options

| Option              | Description                                                              | Default      |
| ------------------- | ------------------------------------------------------------------------ | ------------ |
| `--target`          | Target URL (e.g., `https://192.168.1.100`)                               | **Required** |
| `--loop`            | Number of requests to send                                               | `1`          |
| `--delay`           | Delay between requests in seconds                                        | `2.0`        |
| `--test-method`     | The testing method to use (`randomized`, `oversized-headers`, `oversized-body`) | `randomized` |
| `--json-out`        | Export found tokens to a JSON file                                       | `None`       |
| `--csv-out`         | Export found tokens to a CSV file                                        | `None`       |
| `--raw-out`         | Export raw response content to a file                                    | `None`       |
| `--no-insecure`     | Enable TLS certificate verification                                      | `disabled`   |


## Legal Disclaimer

This script is provided for educational and authorized security testing purposes only. By using this script, you agree that you will only use it on systems for which you have explicit, written permission to test. The author and contributors are not responsible for any misuse or damage caused by this script. Unauthorized scanning of systems is illegal and strictly prohibited.
File Snapshot

[4.0K] /data/pocs/a15586d56e43a874af9e38d274ba1158868a376b ├── [ 12K] citrix_bleed_2_scanner.py ├── [3.2K] README.md └── [ 8] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.