关联漏洞
            
                
                    标题:
                    Citrix ADC 和 Citrix Gateway 代码注入漏洞
                        (CVE-2023-3519)
                    
                    描述:Citrix Systems Citrix Gateway(Citrix Systems NetScaler Gateway)和Citrix ADC都是美国思杰系统(Citrix Systems)公司的产品。Citrix Gateway是一套安全的远程接入解决方案。该产品可为管理员提供应用级和数据级管控功能,以实现用户从任何地点远程访问应用和数据。Citrix ADC是一个最全面的应用程序交付和负载平衡解决方案。用于实现应用程序安全性、整体可见性和可用性。 Citrix ADC 和 Citrix Gate
                
        
 
        
            描述
            nse script to identify server vulnerable to CVE-2023-3519
        
        
            介绍
            
# CVE-2023-3519 Citrix Vulnerability NSE Script for Nmap
This Nmap NSE script checks for the CVE-2023-3519 vulnerability in Citrix Gateway and Citrix AAA.
## Installation
To use this script, you will need to have Nmap installed. You can download Nmap from [here](https://nmap.org/download.html).
Copy the `cve-2023-3519-checker.nse` file to your Nmap scripts directory. This is typically `/usr/share/nmap/scripts/` on a Unix-based system.
You can verify the script is recognized by Nmap by running:
```shell
nmap --script-updatedb
```
## Usage
To use this script, run the following command:
```shell
nmap --script cve-2023-3519-checker --script-args checktype=service|vuln <target>
```
Replace <target> with the IP address or hostname you want to scan.
## Note
Feel Free to open issues or anything you want me to add in like new checks .
## License
This project is licensed under the same license as Nmap - GPLv2.
## Author
[Ashish Kunwar](https://twitter.com/D0rkerDevil)
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/fcbdc68a5e310a9ff4cb29a63bfac1814122a19a
├── [2.8K]  cve-2023-3519-checker.nse
└── [ 987]  README.md
0 directories, 2 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。