var-201509-0322
Vulnerability from variot
Cross-site scripting (XSS) vulnerability in the Administrative Web Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 10.1 Build 132.8, 10.5 before Build 57.7, and 10.5e before Build 56.1505.e allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. The following products and versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to Build 132.8, 10.5 prior to Build 57.7, and 10.5e prior to Build 56.1505.e
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201509-0322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 57.7" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 57.7" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5e build 56.1505.e" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5e build 56.1505.e" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "db": "CNNVD", "id": "CNNVD-201509-224" }, { "db": "NVD", "id": "CVE-2015-6672" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:netscaler_application_delivery_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_gateway_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004891" } ] }, "cve": "CVE-2015-6672", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "CVE-2015-6672", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-84633", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-6672", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-6672", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201509-224", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-84633", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2015-6672", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-84633" }, { "db": "VULMON", "id": "CVE-2015-6672" }, { "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "db": "CNNVD", "id": "CNNVD-201509-224" }, { "db": "NVD", "id": "CVE-2015-6672" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cross-site scripting (XSS) vulnerability in the Administrative Web Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 10.1 Build 132.8, 10.5 before Build 57.7, and 10.5e before Build 56.1505.e allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NetScaler ADC is a service and application delivery solution (application delivery controller); NetScaler Gateway is a secure remote access solution. The following products and versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to Build 132.8, 10.5 prior to Build 57.7, and 10.5e prior to Build 56.1505.e", "sources": [ { "db": "NVD", "id": "CVE-2015-6672" }, { "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "db": "VULHUB", "id": "VHN-84633" }, { "db": "VULMON", "id": "CVE-2015-6672" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-6672", "trust": 2.6 }, { "db": "SECTRACK", "id": "1033618", "trust": 1.2 }, { "db": "JVNDB", "id": "JVNDB-2015-004891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201509-224", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-84633", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2015-6672", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84633" }, { "db": "VULMON", "id": "CVE-2015-6672" }, { "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "db": "CNNVD", "id": "CNNVD-201509-224" }, { "db": "NVD", "id": "CVE-2015-6672" } ] }, "id": "VAR-201509-0322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-84633" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:42:27.465000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX201334", "trust": 0.8, "url": "http://support.citrix.com/article/CTX201334" }, { "title": "Citrix Security Bulletins: Citrix NetScaler Application Delivery Controller and NetScaler Gateway Multiple Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=cb922395c3802bcb12cf5bf0bb4f8f49" } ], "sources": [ { "db": "VULMON", "id": "CVE-2015-6672" }, { "db": "JVNDB", "id": "JVNDB-2015-004891" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-84633" }, { "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "db": "NVD", "id": "CVE-2015-6672" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://support.citrix.com/article/ctx201334" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1033618" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-6672" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-6672" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/79.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-84633" }, { "db": "VULMON", "id": "CVE-2015-6672" }, { "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "db": "CNNVD", "id": "CNNVD-201509-224" }, { "db": "NVD", "id": "CVE-2015-6672" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-84633" }, { "db": "VULMON", "id": "CVE-2015-6672" }, { "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "db": "CNNVD", "id": "CNNVD-201509-224" }, { "db": "NVD", "id": "CVE-2015-6672" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-09-17T00:00:00", "db": "VULHUB", "id": "VHN-84633" }, { "date": "2015-09-17T00:00:00", "db": "VULMON", "id": "CVE-2015-6672" }, { "date": "2015-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "date": "2015-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-224" }, { "date": "2015-09-17T16:59:04.010000", "db": "NVD", "id": "CVE-2015-6672" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-22T00:00:00", "db": "VULHUB", "id": "VHN-84633" }, { "date": "2016-12-22T00:00:00", "db": "VULMON", "id": "CVE-2015-6672" }, { "date": "2015-09-29T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-004891" }, { "date": "2015-09-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201509-224" }, { "date": "2024-11-21T02:35:24.520000", "db": "NVD", "id": "CVE-2015-6672" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-224" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix NetScaler Application Delivery Controller and NetScaler Gateway Management Web Interface cross-site scripting vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-004891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201509-224" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.