Citrix Netscaler 10.5 AppFirewall application/octet-stream access control
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.6 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical has been found in Citrix Netscaler 10.5. This impacts an unknown function of the file application/octet-stream of the component AppFirewall. The manipulation leads to access control. This vulnerability is listed as CVE-2015-2841. In addition, an exploit is available.
Details
A vulnerability was found in Citrix Netscaler 10.5 (Network Management Software) and classified as critical. This issue affects some unknown processing of the file application/octet-stream of the component AppFirewall. The manipulation with an unknown input leads to a access control vulnerability. Using CWE to declare the problem leads to CWE-284. The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Citrix NetScaler AppFirewall, as used in NetScaler 10.5, allows remote attackers to bypass intended firewall restrictions via a crafted Content-Type header, as demonstrated by the application/octet-stream and text/xml Content-Types.
The weakness was presented 04/03/2015 (Website). The advisory is shared at securitytracker.com. The identification of this vulnerability is CVE-2015-2841 since 04/03/2015. The attack may be initiated remotely. No form of authentication is needed for a successful exploitation. Technical details as well as a public exploit are known. MITRE ATT&CK project uses the attack technique T1068 for this issue.
A public exploit has been developed by BGA Security and been published even before and not after the advisory. The exploit is available at exploit-db.com. It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 22 days. During that time the estimated underground price was around $5k-$25k.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the databases at Exploit-DB (36369), SecurityFocus (BID 73139†) and Vulnerability Center (SBV-49488†). See VDB-74017 for similar entry. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.citrix.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 6.6
VulDB Base Score: 7.3
VulDB Temp Score: 6.6
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Access controlCWE: CWE-284 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Author: BGA Security
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
03/12/2015 🔍03/12/2015 🔍
03/12/2015 🔍
04/03/2015 🔍
04/03/2015 🔍
04/03/2015 🔍
04/04/2015 🔍
04/12/2015 🔍
07/29/2025 🔍
Sources
Vendor: citrix.comAdvisory: securitytracker.com⛔
Status: Not defined
CVE: CVE-2015-2841 (🔍)
GCVE (CVE): GCVE-0-2015-2841
GCVE (VulDB): GCVE-100-74633
SecurityFocus: 73139
SecurityTracker: 1031928
Vulnerability Center: 49488 - Citrix NetScaler AppFirewall 10.5 Remote Security Bypass via Content-Type Header, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 04/04/2015 09:56Updated: 07/29/2025 03:56
Changes: 04/04/2015 09:56 (56), 06/25/2017 08:43 (8), 05/02/2022 16:21 (3), 07/29/2025 03:56 (18)
Complete: 🔍
Cache ID: 216:035:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.