Action not permitted
Modal body text goes here.
ghsa-w4rw-v3mm-hj8h
Vulnerability from github
Published
2024-01-17 21:30
Modified
2024-01-17 21:30
Severity
Details
[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]
{ "affected": [], "aliases": [ "CVE-2023-6548" ], "database_specific": { "cwe_ids": [ "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-01-17T20:15:50Z", "severity": "MODERATE" }, "details": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]", "id": "GHSA-w4rw-v3mm-hj8h", "modified": "2024-01-17T21:30:21Z", "published": "2024-01-17T21:30:21Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6548" }, { "type": "WEB", "url": "https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "type": "CVSS_V3" } ] }
cve-2023-6548
Vulnerability from cvelistv5
Published
2024-01-17 20:11
Modified
2024-08-02 08:35
Severity
Summary
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:14.1:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "14.1-12.35", "status": "affected", "version": "14.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "13.1-51.15", "status": "affected", "version": "13.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.0:*:*:*:-:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "13.0-92.21", "status": "affected", "version": "13.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:13.1:*:*:*:fips:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "13.1-37.176", "status": "affected", "version": "13.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:fips:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "12.1-55.302", "status": "affected", "version": "12.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.1:*:*:*:ndcpp:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_application_delivery_controller", "vendor": "citrix", "versions": [ { "lessThan": "12.1-55.302", "status": "affected", "version": "12.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_gateway:14.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_gateway", "vendor": "citrix", "versions": [ { "lessThan": "14.1-12.35", "status": "affected", "version": "14.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_gateway:13.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_gateway", "vendor": "citrix", "versions": [ { "lessThan": "13.1-51.15", "status": "affected", "version": "13.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:citrix:netscaler_gateway:13.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "netscaler_gateway", "vendor": "citrix", "versions": [ { "lessThan": "13.0-92.21", "status": "affected", "version": "13.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-6548", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-18T14:00:57.375485Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-01-17", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-6548" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T17:14:26.335Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:35:14.029Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "NetScaler ADC\u202f", "vendor": "Cloud Software Group", "versions": [ { "lessThan": "12.35", "status": "affected", "version": "14.1", "versionType": "patch" }, { "lessThan": "51.15", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "92.21", "status": "affected", "version": "13.0 ", "versionType": "patch" }, { "lessThan": "37.176", "status": "affected", "version": " 13.1-FIPS", "versionType": "patch" }, { "lessThan": "55.302", "status": "affected", "version": "12.1-FIPS", "versionType": "patch" }, { "lessThan": "55.302", "status": "affected", "version": "12.1-NDcPP", "versionType": "patch" } ] }, { "defaultStatus": "unaffected", "product": "NetScaler Gateway", "vendor": "Cloud Software Group", "versions": [ { "lessThan": "12.35", "status": "affected", "version": "14.1", "versionType": "patch" }, { "lessThan": "51.15", "status": "affected", "version": "13.1", "versionType": "patch" }, { "lessThan": "92.21", "status": "affected", "version": "13.0", "versionType": "patch" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper Control of Generation of Code (\u0027Code Injection\u0027) in NetScaler ADC and NetScaler Gateway\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eallows an attacker with\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;access\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;to NSIP, CLIP or SNIP with management interface to perform\u003c/span\u003e\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAuthenticated (low privileged) remote code execution on Management Interface.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e" } ], "value": "Improper Control of Generation of Code (\u0027Code Injection\u0027) in NetScaler ADC and NetScaler Gateway\u00a0allows an attacker with\u00a0access\u00a0to NSIP, CLIP or SNIP with management interface to perform\u00a0Authenticated (low privileged) remote code execution on Management Interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-18T01:12:54.917Z", "orgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "shortName": "Citrix" }, "references": [ { "url": "https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e437aed5-38e0-4fa3-a98b-cb73e7acaec6", "assignerShortName": "Citrix", "cveId": "CVE-2023-6548", "datePublished": "2024-01-17T20:11:18.462Z", "dateReserved": "2023-12-06T11:01:54.643Z", "dateUpdated": "2024-08-02T08:35:14.029Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...