var-201405-0303
Vulnerability from variot
Unspecified vulnerability in the management GUI in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 9.3-66.5 and 10.x before 10.1-122.17 has unspecified impact and vectors, related to certificate validation. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. There are currently no details about this vulnerability. Please keep an eye on the cnnvd website or manufacturer announcements. Vulnerability title: Lack of SSL Certificate Validation in Citrix Netscaler CVE: CVE-2014-2882 Vendor: Citrix Product: Netscaler Affected version: All prior to 10.1-122.17/9.3-66.5 Fixed version: 10.1-122.17/9.3-66.5 Reported by: Graham Sutherland
Details:
The remote configuration Java applet assigns an empty trust manager to its SSL context, causing it to accept any certificate regardless of validity.
Further details at: https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2882/
Copyright: Copyright (c) Portcullis Computer Security Limited 2014, All rights reserved worldwide. Permission is hereby granted for the electronic redistribution of this information. It is not to be edited or altered in any way without the express written consent of Portcullis Computer Security Limited.
Disclaimer: The information herein contained may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (Portcullis Computer Security Limited) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201405-0303", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler access gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "9.3" }, { "model": "netscaler application delivery controller", "scope": "lte", "trust": 1.0, "vendor": "citrix", "version": "9.3.e" }, { "model": "netscaler access gateway", "scope": "lte", "trust": 1.0, "vendor": "citrix", "version": "10.1.e" }, { "model": "netscaler access gateway", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": null }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.0, "vendor": "citrix", "version": null }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.1-122.17" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.1-122.17" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "of 10.x" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "of 10.x" }, { "model": "netscaler access gateway", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "10.1.e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.6, "vendor": "citrix", "version": "9.3.e" }, { "model": "access gateway enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "9.2" } ], "sources": [ { "db": "BID", "id": "67160" }, { "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "db": "CNNVD", "id": "CNNVD-201405-003" }, { "db": "NVD", "id": "CVE-2014-2882" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:netscaler_application_delivery_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002346" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Graham Sutherland", "sources": [ { "db": "BID", "id": "67160" }, { "db": "PACKETSTORM", "id": "126519" } ], "trust": 0.4 }, "cve": "CVE-2014-2882", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2014-2882", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.0, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-2882", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-70821", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-2882", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-2882", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201405-003", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-70821", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-70821" }, { "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "db": "CNNVD", "id": "CNNVD-201405-003" }, { "db": "NVD", "id": "CVE-2014-2882" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Unspecified vulnerability in the management GUI in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 9.3-66.5 and 10.x before 10.1-122.17 has unspecified impact and vectors, related to certificate validation. \nSuccessfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers, which will aid in further attacks. There are currently no details about this vulnerability. Please keep an eye on the cnnvd website or manufacturer announcements. Vulnerability title: Lack of SSL Certificate Validation in Citrix Netscaler\nCVE: CVE-2014-2882\nVendor: Citrix\nProduct: Netscaler\nAffected version: All prior to 10.1-122.17/9.3-66.5\nFixed version: 10.1-122.17/9.3-66.5\nReported by: Graham Sutherland\n\nDetails:\n\nThe remote configuration Java applet assigns an empty trust manager to\nits SSL context, causing it to accept any certificate regardless of\nvalidity. \n \n\nFurther details at:\nhttps://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2882/\n\n\nCopyright:\nCopyright (c) Portcullis Computer Security Limited 2014, All rights\nreserved worldwide. Permission is hereby granted for the electronic\nredistribution of this information. It is not to be edited or altered in\nany way without the express written consent of Portcullis Computer\nSecurity Limited. \n\nDisclaimer:\nThe information herein contained may change without notice. Use of this\ninformation constitutes acceptance for use in an AS IS condition. There\nare NO warranties, implied or otherwise, with regard to this information\nor its use. Any use of this information is at the user\u0027s risk. In no\nevent shall the author/distributor (Portcullis Computer Security\nLimited) be held liable for any damages whatsoever arising out of or in\nconnection with the use or spread of this information", "sources": [ { "db": "NVD", "id": "CVE-2014-2882" }, { "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "db": "BID", "id": "67160" }, { "db": "VULHUB", "id": "VHN-70821" }, { "db": "PACKETSTORM", "id": "126519" } ], "trust": 2.07 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-70821", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-70821" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-2882", "trust": 2.9 }, { "db": "SECTRACK", "id": "1030180", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2014-002346", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201405-003", "trust": 0.7 }, { "db": "BID", "id": "67160", "trust": 0.4 }, { "db": "PACKETSTORM", "id": "126519", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-70821", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-70821" }, { "db": "BID", "id": "67160" }, { "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "db": "PACKETSTORM", "id": "126519" }, { "db": "CNNVD", "id": "CNNVD-201405-003" }, { "db": "NVD", "id": "CVE-2014-2882" } ] }, "id": "VAR-201405-0303", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-70821" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:18:37.115000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX140651", "trust": 0.8, "url": "http://support.citrix.com/article/CTX140651" }, { "title": "agee-9.3-66.5", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=49707" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "db": "CNNVD", "id": "CNNVD-201405-003" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2014-2882" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://support.citrix.com/article/ctx140651" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1030180" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2882" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2882" }, { "trust": 0.3, "url": "http://www.citrix.com/" }, { "trust": 0.1, "url": "https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-2882/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-2882" } ], "sources": [ { "db": "VULHUB", "id": "VHN-70821" }, { "db": "BID", "id": "67160" }, { "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "db": "PACKETSTORM", "id": "126519" }, { "db": "CNNVD", "id": "CNNVD-201405-003" }, { "db": "NVD", "id": "CVE-2014-2882" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-70821" }, { "db": "BID", "id": "67160" }, { "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "db": "PACKETSTORM", "id": "126519" }, { "db": "CNNVD", "id": "CNNVD-201405-003" }, { "db": "NVD", "id": "CVE-2014-2882" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-05-01T00:00:00", "db": "VULHUB", "id": "VHN-70821" }, { "date": "2014-04-30T00:00:00", "db": "BID", "id": "67160" }, { "date": "2014-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "date": "2014-05-06T20:41:11", "db": "PACKETSTORM", "id": "126519" }, { "date": "2014-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-003" }, { "date": "2014-05-01T17:28:36.383000", "db": "NVD", "id": "CVE-2014-2882" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-07-18T00:00:00", "db": "VULHUB", "id": "VHN-70821" }, { "date": "2014-05-07T12:13:00", "db": "BID", "id": "67160" }, { "date": "2014-05-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002346" }, { "date": "2014-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-201405-003" }, { "date": "2024-11-21T02:07:07.550000", "db": "NVD", "id": "CVE-2014-2882" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "126519" }, { "db": "CNNVD", "id": "CNNVD-201405-003" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix NetScaler Application Delivery Controller and NetScaler Gateway Management GUI Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002346" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "lack of information", "sources": [ { "db": "CNNVD", "id": "CNNVD-201405-003" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.