var-201511-0028
Vulnerability from variot
The Nitro API in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 10.1 Build 133.9, 10.5 before Build 58.11, and 10.5.e before Build 56.1505.e on NetScaler Service Delivery Appliance Service VM (SVM) devices allow attackers to obtain credentials via the browser cache. Citrix NetScaler Service Delivery Appliance is prone to multiple local information-disclosure vulnerabilities. Local attackers can exploit these issues to obtain sensitive information. This may aid in further attacks. The following versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to Build 133.9, 10.5 prior to Build 58.11, and 10.5.e prior to Build 56.1505.e
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201511-0028", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler service delivery appliance service vm", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5e" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler gateway", "scope": "eq", "trust": 1.6, "vendor": "citrix", "version": "10.1" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5.e build 56.1505.e" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 58.11" }, { "model": "netscaler application delivery controller", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5 build 58.11" }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5.e" }, { "model": "netscaler gateway", "scope": "eq", "trust": 0.8, "vendor": "citrix", "version": "10.5.e build 56.1505.e" }, { "model": "netscaler gateway", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5.e" }, { "model": "netscaler service delivery appliance service vm", "scope": null, "trust": 0.8, "vendor": "citrix", "version": null }, { "model": "netscaler application delivery controller", "scope": "lt", "trust": 0.8, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler service delivery appliance 10.5e", "scope": null, "trust": 0.3, "vendor": "citrix", "version": null }, { "model": "netscaler service delivery appliance build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.557.7" }, { "model": "netscaler service delivery appliance build 54.9009.e", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.5" }, { "model": "netscaler service delivery appliance 10.1e", "scope": null, "trust": 0.3, "vendor": "citrix", "version": null }, { "model": "netscaler service delivery appliance build", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1132.8" }, { "model": "netscaler service delivery appliance", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "10.1" } ], "sources": [ { "db": "BID", "id": "77565" }, { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "CNNVD", "id": "CNNVD-201511-277" }, { "db": "NVD", "id": "CVE-2015-7996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:citrix:netscaler_application_delivery_controller_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_gateway_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:citrix:netscaler_service_delivery_appliance_service_vm", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005964" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "77565" } ], "trust": 0.3 }, "cve": "CVE-2015-7996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2015-7996", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-85957", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2015-7996", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2015-7996", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201511-277", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-85957", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-85957" }, { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "CNNVD", "id": "CNNVD-201511-277" }, { "db": "NVD", "id": "CVE-2015-7996" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Nitro API in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway before 10.1 Build 133.9, 10.5 before Build 58.11, and 10.5.e before Build 56.1505.e on NetScaler Service Delivery Appliance Service VM (SVM) devices allow attackers to obtain credentials via the browser cache. Citrix NetScaler Service Delivery Appliance is prone to multiple local information-disclosure vulnerabilities. \nLocal attackers can exploit these issues to obtain sensitive information. This may aid in further attacks. The following versions are affected: Citrix Systems NetScaler ADC and NetScaler Gateway 10.1 prior to Build 133.9, 10.5 prior to Build 58.11, and 10.5.e prior to Build 56.1505.e", "sources": [ { "db": "NVD", "id": "CVE-2015-7996" }, { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "BID", "id": "77565" }, { "db": "VULHUB", "id": "VHN-85957" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-7996", "trust": 2.8 }, { "db": "SECTRACK", "id": "1034167", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2015-005964", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201511-277", "trust": 0.7 }, { "db": "BID", "id": "77565", "trust": 0.3 }, { "db": "VULHUB", "id": "VHN-85957", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85957" }, { "db": "BID", "id": "77565" }, { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "CNNVD", "id": "CNNVD-201511-277" }, { "db": "NVD", "id": "CVE-2015-7996" } ] }, "id": "VAR-201511-0028", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-85957" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:07:57.464000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CTX202482", "trust": 0.8, "url": "http://support.citrix.com/article/CTX202482" }, { "title": "Citrix Systems NetScaler Application Delivery Controller and NetScaler Gateway Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58763" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "CNNVD", "id": "CNNVD-201511-277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-85957" }, { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "NVD", "id": "CVE-2015-7996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "http://support.citrix.com/article/ctx202482" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1034167" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7996" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7996" }, { "trust": 0.3, "url": "http://www.citrix.com/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-85957" }, { "db": "BID", "id": "77565" }, { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "CNNVD", "id": "CNNVD-201511-277" }, { "db": "NVD", "id": "CVE-2015-7996" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-85957" }, { "db": "BID", "id": "77565" }, { "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "db": "CNNVD", "id": "CNNVD-201511-277" }, { "db": "NVD", "id": "CVE-2015-7996" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-11-17T00:00:00", "db": "VULHUB", "id": "VHN-85957" }, { "date": "2015-11-11T00:00:00", "db": "BID", "id": "77565" }, { "date": "2015-11-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "date": "2015-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-277" }, { "date": "2015-11-17T15:59:17.770000", "db": "NVD", "id": "CVE-2015-7996" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2016-12-07T00:00:00", "db": "VULHUB", "id": "VHN-85957" }, { "date": "2015-11-11T00:00:00", "db": "BID", "id": "77565" }, { "date": "2015-11-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-005964" }, { "date": "2015-11-18T00:00:00", "db": "CNNVD", "id": "CNNVD-201511-277" }, { "date": "2024-11-21T02:37:48.560000", "db": "NVD", "id": "CVE-2015-7996" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-277" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Citrix NetScaler Service Delivery Appliance SVM Device NetScaler ADC and NetScaler Gateway Vulnerabilities in which credentials are obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-005964" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201511-277" } ], "trust": 0.6 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.