VAR-201803-2076

Vulnerability from variot - Updated: 2023-12-18 13:08

Command injection vulnerability in Citrix NetScaler ADC and NetScaler Gateway 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13; and the NetScaler Load Balancing instance distributed with NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition 9.3.0 allows remote attackers to execute a system command or read arbitrary files via an SSH login prompt. plural Citrix The product contains a command injection vulnerability.Information may be obtained. Citrix NetScaler ADC and NetScaler Gateway are prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism. This may aid in further attacks. The following products are affected: Citrix NetScaler ADC and NetScaler Gateway version 12.0 builds 41.16, 41.22, 41.24, 51.24 and 53.6 Citrix NetScaler ADC and NetScaler Gateway version 11.1 builds 51.21, 51.26, 52.13, 53.11, 54.14, 54.16 and 55.10 Citrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.12. Citrix NetScaler Application Delivery Controller, etc. are all products of Citrix Systems (Citrix Systems). NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. A command injection vulnerability exists in the management interface and NetScaler Load Balancing instances in several Citrix products. The following products are affected: NetScaler ADC 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13; NetScaler Gateway 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13 (management interface); SD-WAN/CloudBridge 4000 WAN Optimization Edition version 9.3.0; 4100 WAN Optimization Edition version 9.3.0; 5000 WAN Optimization Edition version 9.3.0; 5100 WAN Optimization Edition version 9.3.0 (NetScaler Load Balancing instance)

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201803-2076",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netscaler sd-wan",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "9.3.0"
      },
      {
        "model": "netscaler gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.0"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.0"
      },
      {
        "model": "netscaler gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.1"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "11.1"
      },
      {
        "model": "netscaler gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "12.0"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "citrix",
        "version": "12.0"
      },
      {
        "model": "netscaler application delivery controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "citrix",
        "version": null
      },
      {
        "model": "netscaler gateway",
        "scope": null,
        "trust": 0.8,
        "vendor": "citrix",
        "version": null
      },
      {
        "model": "netscaler sd-wan",
        "scope": null,
        "trust": 0.8,
        "vendor": "citrix",
        "version": null
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.6"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.051.24"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.24"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.22"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.16"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.10"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.16"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.14"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.153.11"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.152.13"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.26"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.21"
      },
      {
        "model": "netscaler gateway build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.12"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.6"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.051.24"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.24"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.22"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.041.16"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.10"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.16"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.154.14"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.153.11"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.152.13"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.26"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.151.21"
      },
      {
        "model": "netscaler adc build",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.12"
      },
      {
        "model": "netscaler gateway build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.13"
      },
      {
        "model": "netscaler gateway build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.13"
      },
      {
        "model": "netscaler gateway build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.16"
      },
      {
        "model": "netscaler adc build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "12.053.13"
      },
      {
        "model": "netscaler adc build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.155.13"
      },
      {
        "model": "netscaler adc build",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "citrix",
        "version": "11.070.16"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:citrix:netscaler_gateway:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:citrix:netscaler_gateway:12.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:11.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:citrix:netscaler_application_delivery_controller:12.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:citrix:netscaler_sd-wan:9.3.0:*:*:*:wan_optimization:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:citrix:netscaler_gateway:11.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xcuter, blankcon, nullbr4in, loupos, koredge of NAVER BUSINESS PLATFORM.",
    "sources": [
      {
        "db": "BID",
        "id": "103186"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2018-5314",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2018-5314",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-135345",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.5,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2018-5314",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2018-5314",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201803-031",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-135345",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Command injection vulnerability in Citrix NetScaler ADC and NetScaler Gateway 11.0 before build 70.16, 11.1 before build 55.13, and 12.0 before build 53.13; and the NetScaler Load Balancing instance distributed with NetScaler SD-WAN/CloudBridge 4000, 4100, 5000 and 5100 WAN Optimization Edition 9.3.0 allows remote attackers to execute a system command or read arbitrary files via an SSH login prompt. plural Citrix The product contains a command injection vulnerability.Information may be obtained. Citrix NetScaler ADC and NetScaler Gateway are prone to an authentication-bypass vulnerability. \nAn attacker can exploit this issue to bypass the authentication mechanism. This may aid in further attacks. \nThe following products are affected:\nCitrix NetScaler ADC and NetScaler Gateway version 12.0 builds 41.16, 41.22, 41.24, 51.24 and 53.6\nCitrix NetScaler ADC and NetScaler Gateway version 11.1 builds 51.21, 51.26, 52.13, 53.11, 54.14, 54.16 and 55.10\nCitrix NetScaler ADC and NetScaler Gateway version 11.0 build 70.12. Citrix NetScaler Application Delivery Controller, etc. are all products of Citrix Systems (Citrix Systems). NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. A command injection vulnerability exists in the management interface and NetScaler Load Balancing instances in several Citrix products. The following products are affected: NetScaler ADC 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13; NetScaler Gateway 11.0 prior to 70.16, 11.1 prior to 55.13, 12.0 prior to 53.13 (management interface); SD-WAN/CloudBridge 4000 WAN Optimization Edition version 9.3.0; 4100 WAN Optimization Edition version 9.3.0; 5000 WAN Optimization Edition version 9.3.0; 5100 WAN Optimization Edition version 9.3.0 (NetScaler Load Balancing instance)",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-5314",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "103186",
        "trust": 2.0
      },
      {
        "db": "SECTRACK",
        "id": "1040439",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-135345",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "id": "VAR-201803-2076",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T13:08:32.130000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "CTX232199",
        "trust": 0.8,
        "url": "https://support.citrix.com/article/ctx232199"
      },
      {
        "title": "Multiple Citrix Product Command Injection Vulnerability Fixes",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=78826"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-77",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://support.citrix.com/article/ctx232199"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/bid/103186"
      },
      {
        "trust": 1.7,
        "url": "http://www.securitytracker.com/id/1040439"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5314"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5314"
      },
      {
        "trust": 0.3,
        "url": "http://www.citrix.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "db": "BID",
        "id": "103186"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "date": "2018-02-28T00:00:00",
        "db": "BID",
        "id": "103186"
      },
      {
        "date": "2018-04-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "date": "2018-03-01T17:29:00.477000",
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "date": "2018-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-135345"
      },
      {
        "date": "2018-02-28T00:00:00",
        "db": "BID",
        "id": "103186"
      },
      {
        "date": "2018-04-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      },
      {
        "date": "2019-10-03T00:03:26.223000",
        "db": "NVD",
        "id": "CVE-2018-5314"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Citrix Command injection vulnerability in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-002511"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201803-031"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…