Citrix MetaFrame Presentation Server安全策略绕过漏洞

Citrix MetaFrame Presentation Server安全策略绕过漏洞

漏洞ID 1197725 漏洞类型 访问验证错误
发布时间 2005-10-04 更新时间 2005-10-20
图片[1]-Citrix MetaFrame Presentation Server安全策略绕过漏洞-安全小百科CVE编号 CVE-2005-3134
图片[2]-Citrix MetaFrame Presentation Server安全策略绕过漏洞-安全小百科CNNVD-ID CNNVD-200510-008
漏洞平台 N/A CVSS评分 7.5
|漏洞来源
https://cxsecurity.com/issue/WLB-2005090032
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200510-008
|漏洞详情
CitrixMetaframePresentationServer3.0和4.0可以使远程攻击者通过下载launch.ica文件并更改客户端设备名称(ClientName)来绕过策略限制。
|漏洞EXP
DESCRIPTION:
============

Vulnerability in Presentation Server allow to user bypass citrix policy
which is applied to client name.

SOFTWARE: Citrix Metaframe Presentation Server 3.0 / 4.0
=========

INFO:
=====

Citrix Presentation Server policy is used for admins to restrict the user
environment
and these allow applying to: IP client, servers, Users, o Client Name.

When user used the Web Interface to access to application in citrix
environment
the CLIENT NAME used is WI_*, where (*) is a random value like
asdfserw34vc342dk
this extension allow admins to use citrix policy based in client name "WI_*"
This policy can be used to restrict "printing Mapping, Disk Mapping,
Control bandwidth, manage printer driver environment so..."

VULNERABILITY:
==============

When user uses the application in Web interface, he download and execute
automatic file "launch.ica"

If the user "save as" launch.ica  in his pc, and edit with notepad
He can change the value in ClientName that another "WI_" and execute

When user connects to citrix with ica file modified to Presentation
Server, the value in clientname is different to the original one and
bypasses the citrix policies.

POC:
====

Here is an example extracted from launch.ica:

[Encoding]

InputEncoding=ISO8859_1

[WFClient]

Version=2

ClientName=WI_XXXX -> change this extension with other name to bypass the
citrix policies

TransportReconnectEnabled=On

RemoveICAFile=yes

ProxyType=None

ProxyTimeout=30000

VENDOR STATUS:
==============

http://support.citrix.com/kb/entry!default.jspa?categoryID=275&externalI
D=CTX107705

FIX:
====

No Hotfix released

CREDITS:
========

This vulnerability was discovered and researched by
Gustavo Gurmandi of GrupoITPro Security Research Community.

mail : gustavog (at) grupoiptro.com (dot) ar [email concealed]

web : http://www.grupoitpro.com.ar

ORIGINAL ADVISORY:
==================

http://www.grupoitpro.com.ar/ctxpoliciesbypass.txt
|参考资料

来源:BID
名称:14989
链接:http://www.securityfocus.com/bid/14989
来源:MISC
链接:http://www.grupoitpro.com.ar/ctxpoliciesbypass.txt
来源:support.citrix.com
链接:http://support.citrix.com/kb/entry%21default.jspa?categoryID=275&externalID;=CTX107705
来源:SECUNIA
名称:17032
链接:http://secunia.com/advisories/17032/
来源:BUGTRAQ
名称:20050930CitrixMetaframePresentationServerbypassingpolicies
链接:http://marc.theaimsgroup.com/?l=bugtraq&m;=112811189420696&w;=2
来源:SECTRACK
名称:1014994
链接:http://securitytracker.com/id?1014994
来源:SREASON
名称:39
链接:http://securityreason.com/securityalert/39

相关推荐: OverByte ICS FTP Server – Remote Denial of Service

OverByte ICS FTP Server – Remote Denial of Service 漏洞ID 1054533 漏洞类型 发布时间 2004-07-20 更新时间 2004-07-20 CVE编号 N/A CNNVD-ID N/A 漏洞平台 W…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享