module
Citrix NetScaler SOAP Handler Remote Code Execution
Disclosed | Created |
---|---|
2014-09-22 | 2018-05-30 |
Disclosed
2014-09-22
Created
2018-05-30
Description
This module exploits a memory corruption vulnerability on the Citrix NetScaler Appliance.
The vulnerability exists in the SOAP handler, accessible through the web interface. A
malicious SOAP requests can force the handler to connect to a malicious NetScaler config
server. This malicious config server can send a specially crafted response in order to
trigger a memory corruption and overwrite data in the stack, to finally execute arbitrary
code with the privileges of the web server running the SOAP handler. This module has been
tested successfully on the NetScaler Virtual Appliance 450010.
The vulnerability exists in the SOAP handler, accessible through the web interface. A
malicious SOAP requests can force the handler to connect to a malicious NetScaler config
server. This malicious config server can send a specially crafted response in order to
trigger a memory corruption and overwrite data in the stack, to finally execute arbitrary
code with the privileges of the web server running the SOAP handler. This module has been
tested successfully on the NetScaler Virtual Appliance 450010.
Authors
Bradley Austin
juan vazquez juan.vazquez@metasploit.com
juan vazquez juan.vazquez@metasploit.com
Platform
BSD
Architectures
x86
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.