CVE-2020-8300
MEDIUMCitrix ADC and Gateway < 13.0-82.41, 12.1-62.23, 11.1-65.20 - SAML Authentication Hijack via Session Theft
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2020-8300. PoCs published by stuartcarroll.
AI-analyzed exploit summary This PowerShell script detects Citrix ADC configurations vulnerable to CVE-2020-8300 by checking for SAML actions or SAML iDP profiles without relaystaterule or acsurlrule parameters. It uses the Citrix ADC NITRO API to authenticate and query configurations.
Description
Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
Exploits (1)
This PowerShell script detects Citrix ADC configurations vulnerable to CVE-2020-8300 by checking for SAML actions or SAML iDP profiles without relaystaterule or acsurlrule parameters. It uses the Citrix ADC NITRO API to authenticate and query configurations.
References (1)
Scores
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N