ID

VAR-200711-0295


CVE

CVE-2007-0011


TITLE

Citrix Access Gateway of Web Session hijack vulnerability in portal interface

Trust: 0.8

sources: JVNDB: JVNDB-2007-001315

DESCRIPTION

The web portal interface in Citrix Access Gateway (aka Citrix Advanced Access Control) before Advanced Edition 4.5 HF1 places a session ID in the URL, which allows context-dependent attackers to hijack sessions by reading "residual information", including the a referer log, browser history, or browser cache. " Residual information " Can be hijacked in the session. Citrix Access Gateway Standard and Advanced Edition are prone to multiple remote vulnerabilities. Exploiting these issues could allow an attacker to: - Obtain sensitive information - Execute code remotely - Hijack sessions - Redirect users to arbitrary sites - Make unauthorized configuration changes Citrix has released patches for these vulnerabilities. Note: This is a belated release to the mailing lists (though most of the tracking services picked this up via the Citrix advisory)... -- History -- Discovered: 05.09.06 (Martin O'Neal) Vendor notified: 19.10.06 Document released: 20.07.07 -- Overview -- Citrix Access Gateways are described [1] as "universal SSL VPN appliances providing a secure, always-on, single point-of-access to an organization's applications and data". Amongst other features, the product provides a web portal to corporate applications and resources. -- Analysis -- The web portal interface incorporates a collection of .NET scripts, which utilise a session ID contained within cookies. During the authentication sequence the user session is redirected via a HTTP meta refresh header in an HTML response. The browser subsequently uses this within the next GET request (and the referer header field of the next HTTP request), placing the session ID in history files, and both client and server logs. The use of the session ID within the HTML content is made worse by the application not setting the HTTP cache control headers appropriately, which can lead to the HTML content being stored within the local browser cache. Where this is a particularly problem, is where the web portal is accessed from a shared or public access terminal, such as an Internet Caf,; the very environment that this type of solution is intended for. Strong authentication technology, such as SecurID 2FA, does not protect against this style of attack, as the session ID is generated after the strong authentication process is completed. -- Recommendations -- Review the recommendations in the Citrix alert [2]. Until the product is upgraded, consider reviewing you remote access policy to restrict the use of the product in shared-access environments. -- CVE -- The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2007-0011 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardises names for security problems. -- References -- [1] http://www.citrix.com/English/ps2/products/product.asp?contentID =15005 [2] http://support.citrix.com/article/CTX113814 -- Revision -- a. Initial release. b. Released. -- Distribution -- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Corsaire accepts no responsibility for any damage caused by the use or misuse of this information. -- Disclaimer -- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Corsaire accepts no responsibility for any damage caused by the use or misuse of this information. -- About Corsaire -- Corsaire are a leading information security consultancy, founded in 1997 in Guildford, Surrey, UK. Corsaire bring innovation, integrity and analytical rigour to every job, which means fast and dramatic security performance improvements. Our services centre on the delivery of information security planning, assessment, implementation, management and vulnerability research. A free guide to selecting a security assessment supplier is available at http://www.penetration-testing.com Copyright 2006-2007 Corsaire Limited. All rights reserved. ---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Full Featured Secunia Network Software Inspector (NSI) is now available: http://secunia.com/network_software_inspector/ The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,000 different Windows applications. 1) A security issue due to residual information left on the client device can be exploited to gain unauthorized access to a user\x92s active session. 2) Multiple unspecified errors in client components (Net6Helper.DLL and npCtxCAO.dll as ActiveX control and Firefox plugin) of Access Gateway Standard and Advanced Editions can be exploited to execute arbitrary code in context of the logged-in user. 3) The web-based administration console of an Access Gateway appliance allows administrator to perform certain actions via HTTP requests without performing any validity checks to verify the request. This can be exploited to e.g. change certain configuration settings, by enticing a logged-in administrator to visit a malicious web site. A redirection issue that may facilitate phishing attacks has also been reported. SOLUTION: Apply hotfix and update firmware to version 4.5.5. Access Gateway Standard Edition 4.5: http://support.citrix.com/article/CTX114028 Access Gateway Advanced Edition 4.5: http://support.citrix.com/article/CTX112803 The vendor also recommends to remove the following components from client devices: VPN ActiveX components: * Net6Helper.DLL (Friendly name: Net6Launcher Class, version number up to and including 4.5.2) EPA Components (ActiveX): * npCtxCAO.dll (Friendly name: CCAOControl Object, version number up to 4,5,0,0) EPA Components (Firefox plugin): * npCtxCAO.dll (Friendly name: Citrix Endpoint Analysis Client, present in two locations) PROVIDED AND/OR DISCOVERED BY: 1) The vendor credits Martin O\x92Neal, Corsaire. 2) The vendor credits Michael White, Symantec. 3) The vendor credits Paul Johnston. ORIGINAL ADVISORY: http://support.citrix.com/article/CTX113814 http://support.citrix.com/article/CTX113815 http://support.citrix.com/article/CTX113816 http://support.citrix.com/article/CTX113817 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2007-0011 // JVNDB: JVNDB-2007-001315 // BID: 24975 // VULHUB: VHN-23373 // PACKETSTORM: 60328 // PACKETSTORM: 57912

AFFECTED PRODUCTS

vendor:citrixmodel:access gatewayscope:eqversion:4.0

Trust: 1.6

vendor:citrixmodel:access gatewayscope:eqversion:4.5

Trust: 1.6

vendor:citrixmodel:access gatewayscope:eqversion:4.2

Trust: 1.6

vendor:citrixmodel:access gatewayscope:ltversion:advanced edition 4.5 hf1

Trust: 0.8

vendor:citrixmodel:advanced access controlscope:eqversion:4.2

Trust: 0.3

vendor:citrixmodel:advanced access controlscope:eqversion:4.0

Trust: 0.3

vendor:citrixmodel:access gateway standard editionscope:eqversion:4.5

Trust: 0.3

vendor:citrixmodel:access gateway advanced editionscope:eqversion:4.5

Trust: 0.3

vendor:citrixmodel:advanced access control hf.1scope:neversion: -

Trust: 0.3

vendor:citrixmodel:access gateway standard editionscope:neversion:4.5.5

Trust: 0.3

vendor:citrixmodel:access gateway advanced editionscope:neversion:4.5.5

Trust: 0.3

sources: BID: 24975 // JVNDB: JVNDB-2007-001315 // CNNVD: CNNVD-200711-058 // NVD: CVE-2007-0011

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2007-0011
value: MEDIUM

Trust: 1.0

NVD: CVE-2007-0011
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-200711-058
value: MEDIUM

Trust: 0.6

VULHUB: VHN-23373
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2007-0011
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-23373
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-23373 // JVNDB: JVNDB-2007-001315 // CNNVD: CNNVD-200711-058 // NVD: CVE-2007-0011

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-23373 // JVNDB: JVNDB-2007-001315 // NVD: CVE-2007-0011

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200711-058

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200711-058

CONFIGURATIONS

sources: JVNDB: JVNDB-2007-001315

PATCH

title:CTX113814url:http://support.citrix.com/article/CTX113814

Trust: 0.8

title:CTX112803url:http://support.citrix.com/article/CTX112803

Trust: 0.8

sources: JVNDB: JVNDB-2007-001315

EXTERNAL IDS

db:NVDid:CVE-2007-0011

Trust: 2.9

db:BIDid:24975

Trust: 2.0

db:SECUNIAid:26143

Trust: 1.8

db:OSVDBid:45288

Trust: 1.7

db:VUPENid:ADV-2007-2583

Trust: 1.7

db:SECTRACKid:1018435

Trust: 1.7

db:JVNDBid:JVNDB-2007-001315

Trust: 0.8

db:CNNVDid:CNNVD-200711-058

Trust: 0.7

db:BUGTRAQid:20071022 CORSAIRE SECURITY ADVISORY - CITRIX ACCESS GATEWAY SESSION ID DISCLOSURE ISSUE

Trust: 0.6

db:XFid:35510

Trust: 0.6

db:PACKETSTORMid:60328

Trust: 0.2

db:VULHUBid:VHN-23373

Trust: 0.1

db:PACKETSTORMid:57912

Trust: 0.1

sources: VULHUB: VHN-23373 // BID: 24975 // JVNDB: JVNDB-2007-001315 // PACKETSTORM: 60328 // PACKETSTORM: 57912 // CNNVD: CNNVD-200711-058 // NVD: CVE-2007-0011

REFERENCES

url:http://support.citrix.com/article/ctx113814

Trust: 2.2

url:http://support.citrix.com/article/ctx112803

Trust: 1.8

url:http://www.securityfocus.com/bid/24975

Trust: 1.7

url:http://osvdb.org/45288

Trust: 1.7

url:http://securitytracker.com/id?1018435

Trust: 1.7

url:http://secunia.com/advisories/26143

Trust: 1.7

url:http://www.securityfocus.com/archive/1/482626/100/100/threaded

Trust: 1.1

url:http://www.vupen.com/english/advisories/2007/2583

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/35510

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2007-0011

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2007-0011

Trust: 0.8

url:http://www.frsirt.com/english/advisories/2007/2583

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/35510

Trust: 0.6

url:http://www.securityfocus.com/archive/1/archive/1/482626/100/100/threaded

Trust: 0.6

url:http://support.citrix.com/article/ctx113815

Trust: 0.4

url:http://support.citrix.com/article/ctx113816

Trust: 0.4

url:http://support.citrix.com/article/ctx113817

Trust: 0.4

url:/archive/1/482626

Trust: 0.3

url:http://www.penetration-testing.com

Trust: 0.1

url:http://www.citrix.com/english/ps2/products/product.asp?contentid

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2007-0011

Trust: 0.1

url:http://cve.mitre.org),

Trust: 0.1

url:http://secunia.com/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/product/6168/

Trust: 0.1

url:http://secunia.com/network_software_inspector/

Trust: 0.1

url:http://secunia.com/advisories/26143/

Trust: 0.1

url:http://support.citrix.com/article/ctx114028

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-23373 // BID: 24975 // JVNDB: JVNDB-2007-001315 // PACKETSTORM: 60328 // PACKETSTORM: 57912 // CNNVD: CNNVD-200711-058 // NVD: CVE-2007-0011

CREDITS

Martin O'NealPaul Johnston

Trust: 0.6

sources: CNNVD: CNNVD-200711-058

SOURCES

db:VULHUBid:VHN-23373
db:BIDid:24975
db:JVNDBid:JVNDB-2007-001315
db:PACKETSTORMid:60328
db:PACKETSTORMid:57912
db:CNNVDid:CNNVD-200711-058
db:NVDid:CVE-2007-0011

LAST UPDATE DATE

2024-11-23T22:24:12.112000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-23373date:2018-10-16T00:00:00
db:BIDid:24975date:2016-07-05T22:00:00
db:JVNDBid:JVNDB-2007-001315date:2012-06-26T00:00:00
db:CNNVDid:CNNVD-200711-058date:2007-11-06T00:00:00
db:NVDid:CVE-2007-0011date:2024-11-21T00:24:46.070

SOURCES RELEASE DATE

db:VULHUBid:VHN-23373date:2007-11-05T00:00:00
db:BIDid:24975date:2007-07-19T00:00:00
db:JVNDBid:JVNDB-2007-001315date:2012-06-26T00:00:00
db:PACKETSTORMid:60328date:2007-10-23T03:57:48
db:PACKETSTORMid:57912date:2007-07-21T02:11:22
db:CNNVDid:CNNVD-200711-058date:2007-07-19T00:00:00
db:NVDid:CVE-2007-0011date:2007-11-05T17:46:00