Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
References
Link | Resource |
---|---|
https://support.citrix.com/article/CTX297155 | Vendor Advisory |
https://support.citrix.com/article/CTX297155 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.citrix.com/article/CTX297155 - Vendor Advisory |
Information
Published : 2021-06-16 14:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8300
Mitre link : CVE-2020-8300
CVE.ORG link : CVE-2020-8300
JSON object : View
Products Affected
citrix
- netscaler_gateway
- application_delivery_controller
- mpx_15100-50g_fips
- mpx_15080-50g_fips
- mpx_8910_fips
- mpx\/sdx_14060_fips
- gateway
- mpx_15060-50g_fips
- application_delivery_controller_firmware
- mpx_15120-50g_fips
- mpx_8905_fips
- mpx_8920_fips
- mpx_15030-50g_fips
- mpx\/sdx_14030_fips
- mpx\/sdx_14080_fips
- mpx_15040-50g_fips
CWE