Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-4966 PoC — Citrix Systems NetScaler ADC和NetScaler Gateway 安全漏洞

Source
Associated Vulnerability
Title:Citrix Systems NetScaler ADC和NetScaler Gateway 安全漏洞 (CVE-2023-4966)
Description:Citrix Systems Citrix NetScaler Gateway(Citrix Systems Gateway)和Citrix Systems NetScaler ADC都是美国思杰系统(Citrix Systems)公司的产品。Citrix NetScaler Gateway是一套安全的远程接入解决方案。该方案可为管理员提供应用级和数据级管控功能,以实现用户从任何地点远程访问应用和数据。Citrix Systems NetScaler ADC是一个应用程序交付和安全平台。 NetScale
Description
Proof Of Concept for te NetScaler Vuln
Readme
# CVE-2023-4966-POC
POC for Citrix NetScaler CVE-2023-4966

---

# Description
This Python script exploits CVE-2023-4966, a critical vulnerability in Citrix ADC instances that allows unauthenticated attackers to leak session tokens. The vulnerability is assigned a CVSS score of 9.4 and is remotely exploitable without user interaction. Citrix NetScaler appliances configured as Gateways (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual servers are vulnerable to this attack.

---

# Usage
`$ OPENSSL_CONF=./openssl.cnf python3.10 exploit.py -h`

## Options
- `-u URL, --url URL` Specify the Citrix ADC / Gateway target (e.g., https://192.168.1.200).
- `-f FILE, --file FILE` Provide a file containing a list of target URLs (one URL per line).
- `-o OUTPUT, --output OUTPUT` Specify the file to save the output results.
- `-v, --verbose` Enable verbose mode.
- `--only-valid` Only show results with valid session tokens.

---

# How to use
For a single target:
- `$ OPENSSL_CONF=./openssl.cnf python3.10 exploit.py -u https://target.example.com`

For multiple targets listed in a file:
- `$ OPENSSL_CONF=./openssl.cnf python3.10 exploit.py -f targets.txt --only-valid`

---

# Disclaimer
This script is provided for educational and research purposes only. Use it responsibly and only on systems you have permission to test. 

# Reference
Senpaisamp, Italy
File Snapshot

[4.0K] /data/pocs/dc4243395533a45c8a4b6100788c94ffa906b718 ├── [6.4K] exploit.py ├── [ 34K] LICENSE ├── [ 172] openssl.cnf ├── [1.3K] README.md └── [ 52] requirements.txt 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.