CVE-2016-2789 – Persistent Cross-Site Scripting Vulnerability in Citrix XenMobile Server 10.x Web User Interface

A Cross-Site Scripting (XSS) vulnerability has been identified in XenMobile Server 10.x.

This vulnerability could potentially be used to execute malicious client-side script in the same context as legitimate content from the web server; if this vulnerability is used to execute script in the browser of an authenticated administrator then the script may be able to gain access to the administrator’s session or other potentially sensitive information.

This vulnerability has been assigned the following CVE number:

  • CVE-2016-2789: Persistent Cross-Site Scripting vulnerability in Citrix XenMobile Server 10.x

This vulnerability affects the following versions of Citrix XenMobile Server:

  • All versions of Citrix XenMobile Server 10.0
  • Citrix XenMobile Server 10.1 earlier than Rolling Patch 4
  • Citrix XenMobile Server 10.3 earlier than Rolling Patch 1

This vulnerability is not present in Citrix XenMobile Device Manager server 9.0 or earlier, formerly known as Zenprise Device Manager server.

Related:

  • No Related Posts

CVE-2016-9603 – Citrix XenServer Security Update

Hotfixes have been released to address these issues. Citrix recommends that affected customers install these hotfixes, which can be downloaded from the following locations:

Citrix XenServer 7.1: CTX221590 – https://support.citrix.com/article/CTX221590

Citrix XenServer 7.0: CTX221571 – https://support.citrix.com/article/CTX221571

Citrix XenServer 6.5 SP1: CTX221716 – https://support.citrix.com/article/CTX221716

Citrix XenServer 6.2 SP1: CTX221569 – https://support.citrix.com/article/CTX221569

Citrix XenServer 6.0.2 Common Criteria: CTX221568– https://support.citrix.com/article/CTX221568

Related:

  • No Related Posts

CVE-2016-6276 – Vulnerability in Citrix Linux VDA (formerly known as Linux Virtual Desktop) Could Result in Privilege Escalation

A vulnerability has been identified in the Linux Virtual Delivery Agent (VDA) component of Citrix XenDesktop that could allow a local user to execute commands as root on the Linux VDA.

The vulnerability affects all versions of the Citrix Linux VDA earlier than version 1.4.0.

This vulnerability has been assigned the following CVE number:

  • CVE-2016-6276: Vulnerability in Citrix Linux VDA (formerly known as Linux Virtual Desktop) Could Result in Privilege Escalation

Related:

  • No Related Posts

CVE-2015-3456 – Citrix Security Advisory

When deployed on KVM, all versions of Citrix CloudPlatform earlier than version 4.5.0 are impacted by this issue. Citrix has released updated packages to address this issue and strongly recommends that affected customers apply the packages as soon as possible. These packages can be downloaded from the following locations:

FileName

qemu-img-0.12.1.2-3.448.el6.3.x86_64.rpm

qemu-kvm-0.12.1.2-3.448.el6.3.x86_64.rpm

ShareFile Link

https://citrix.sharefile.com/d-sbcd71fedbf542f49

https://citrix.sharefile.com/d-s7fd8fec1e074d83b

MD5Sum

0a327bffae9a34b2a6e2d85247cc1f04

c3f2f58f1e0a5d309ec1b6bb18b567f3

For versions of Citrix CloudPlatform earlier than 4.5, the hotfix can be applied with the following steps:

  1. On the host console type the following command: yum install qemu-img-0.12.1.2-3.448.el6.3.x86_64.rpm qemu-kvm-0.12.1.2-3.448.el6.3.x86_64.rpm
  2. Stop/start all VMs or restart the host

Customers using Citrix CloudPlatform version 4.5 on CentOS/RHEL 6.5 should update the vendor qemu packages using the vendor’s instructions. Customers using Citrix CloudPlatform version 4.5 on versions of CentOS/RHEL earlier than 6.5 should update the vendor qemu packages using the vendor’s instructions and, if the KVM snapshot feature is enabled, install ccp-qemu-img-1.0-1.x86_64.rpm from the CloudPlatform tarball.

In addition to the application of this hotfix, Citrix strongly recommends that customers using all currently supported versions of CloudPlatform up to and including 4.5.0 apply any updates recommended by the virtualisation platform vendor.

Please note that, following the application of the updated packages, it may be necessary to restart the host servers. As an alternative, customers can restart all VMs on affected hosts to avoid having to restart the host servers.

Customers using Citrix CloudPlatform on Citrix XenServer are advised to follow the guidance provided above for Citrix XenServer.

Related:

  • No Related Posts

CVE-2013-6938 – Denial of Service vulnerability in Citrix NetScaler SDX Service VM Virtual Machine Daemon

Description of Problem

A denial of service vulnerability has been identified in the Citrix NetScaler SDX service VM Virtual Machine Daemon.

This vulnerability has been assigned the following CVE number:

    • CVE-2013-6938: Denial of service vulnerability in Citrix NetScaler Service VM Virtual Machine Daemon.

This vulnerability affects versions 10.0 and 9.3 of the Citrix NetScaler SDX Service VM only. Version 10.1 of the Citrix NetScaler SDX Service VM is not affected by this vulnerability.

What Customers Should Do

This vulnerability has been addressed in new versions of the Citrix NetScaler SDX Service VM. Citrix recommends that customers upgrade their Citrix NetScaler SDX Service VM to the versions listed below:

    • 10.0-77.5 and later

    • 9.3-64.4 and later

These versions can be obtained from the following location:

NetScaler ADC Service Delivery Appliances

http://www.citrix.com/downloads/netscaler-adc/service-delivery-appliances.html

What Citrix Is Doing

Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at http://support.citrix.com/.

Obtaining Support on This Issue

If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at http://www.citrix.com/site/ss/supportContacts.asp.

Reporting Security Vulnerabilities to Citrix

Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. If you would like to report a security issue to Citrix, please compose an e-mail to secure@citrix.com stating the exact version of the product in which the vulnerability was found and the steps needed to reproduce the vulnerability.

Related:

  • No Related Posts

CVE-2018-18883 – Citrix XenServer Security Update

A security issue has been identified in Citrix XenServer that may allow a malicious administrator of an HVM guest VM to crash the host.

This issue affects the following versions of Citrix XenServer:

  • Citrix XenServer 7.6
  • Citrix XenServer 7.5
  • Citrix XenServer 7.1 LTSR CU1

The following vulnerabilities have been addressed:

  • CVE-2018-18883: Nested VT-x usable even when disabled

Related:

  • No Related Posts

CVE-2016-5109 – Authentication bypass vulnerability in Citrix Worx Home for iOS and Citrix MDX Toolkit for iOS

Citrix has released a new version that addresses this vulnerability. Citrix recommends that customers upgrade to XenMobile MDX Toolkit and Worx Home 10.3.6.x and later. These new versions can be found at the following location:

https://www.citrix.com/downloads/xenmobile.html

Enterprise applications that encrypt application data using the Worx PIN or AD password are not affected. Customers can configure XenMobile Server to encrypt application data with the Worx PIN or AD password through the XenMobile administration console. This can be accomplished by navigating to Settings > Client Properties on the XenMobile Server Administration GUI and ensuring that ENCRYPT_SECRETS_USING_PASSCODE is set to true.

For more information on this, please see the XenMobile Administrators guide at the following location:

http://docs.citrix.com/en-us/xenmobile/10-3/xmob-settings-client-wrapper-con/xenmobile-client-property-reference.html

Related:

  • No Related Posts

CVE-2015-0235 – Citrix Security Advisory for glibc GHOST Vulnerability

A vulnerability has been recently disclosed in the glibc gethostbyname() function. This issue could potentially allow an attacker to inject code into a process that calls the vulnerable function. The issue is known as the GHOST vulnerability and has been assigned the following CVE identifier:

CVE-2015-0235: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235

The vulnerable function is provided by some Linux based operating systems. Customers managing Linux platforms on which Citrix components are deployed are advised to apply any appropriate operating system updates as soon as possible.

A number of Citrix products incorporate Linux components. The following sections provide guidance on the impact and mitigation steps for these products. Citrix products that do not include or execute on a Linux based platform are not impacted by this vulnerability.

Citrix NetScaler MPX and VPX, and all Windows based components of XenDesktop and XenApp, do not include or use the vulnerable function and are therefore not impacted by this issue.

Related:

  • No Related Posts

CVE-2019-11634 – Improper Access Control Vulnerability in AppDNA

A vulnerability has been identified in AppDNA that could result in access controls not being enforced when accessing the web console potentially allowing privilege escalation and remote code execution.

This vulnerability has been assigned the following CVE number:

• CVE-2019-12292: Improper Access Control in AppDNA prior to version 7 1906.1.0.472.

This vulnerability is present in all versions of AppDNA up to and including 7.18

Related:

  • No Related Posts

CVE-2019-11634 – Remote Code Execution Vulnerability in Citrix Workspace app and Receiver for Windows

A new version of Citrix Workspace app and Receiver for Windows has been released. Citrix strongly recommends that customers upgrade Citrix Workspace app to version 1904 or later and Receiver for Windows to LTSR 4.9 CU6 version 4.9.6001.

The new Citrix Workspace app version is available from the following Citrix website location:

https://www.citrix.com/downloads/workspace-app/

The new LTSR version is available from the following Citrix website location:

https://www.citrix.com/downloads/citrix-receiver/windows-ltsr/receiver-for-windows-ltsr-latest.html

Single Sign-on (SSO) could stop working, after applying the security update, for browsers other than Internet Explorer unless explicitly configured. Use the following documentation to ensure proper configuration post fix installation:

https://support.citrix.com/article/CTX133982

Related:

  • No Related Posts