Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-19781 PoC — Citrix Application Delivery Controller和Citrix Systems Gateway 路径遍历漏洞

Source
Associated Vulnerability
Title:Citrix Application Delivery Controller和Citrix Systems Gateway 路径遍历漏洞 (CVE-2019-19781)
Description:Citrix Systems NetScaler Gateway(Citrix Systems Gateway)和Citrix Application Delivery Controller(ADC)都是美国思杰系统(Citrix Systems)公司的产品。Citrix Systems NetScaler Gateway是一套安全的远程接入解决方案。该方案可为管理员提供应用级和数据级管控功能,以实现用户从任何地点远程访问应用和数据。Citrix Application Delivery Controll
Readme
# Remote Code Execution Exploit (CVE-2019-19781)- Citrix Application Delivery Controller & Gateway

Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]

# Usage : bash CVE-2019-19781.sh IP_OF_VULNURABLE_HOST COMMAND_TO_EXECUTE

e.g : bash CVE-2019-19781.sh XX.XX.XX.XX 'cat /etc/passwd'



Live Demo of Exploiting ZERO Day,

[![IMAGE ALT TEXT HERE](https://img.youtube.com/vi/_i7KSPbwYMw/0.jpg)](https://www.youtube.com/watch?v=_i7KSPbwYMw)

By  ./UnknowDevice64

# Reference :

https://support.citrix.com/article/CTX267027

https://nvd.nist.gov/vuln/detail/CVE-2019-19781

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19781
File Snapshot

[4.0K] /data/pocs/d9a77c9580b268d545902e3af69a2e071c41a95e ├── [2.0K] CVE-2019-19781.sh └── [ 695] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.