FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
rdiwakar
Staff
Staff
Article Id 309969
Description

In CVE-2023-4966, a critical sensitive information disclosure vulnerability in Citrix NetScaler ADC and NetScaler Gateway is present when it is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

 

It's a buffer overflow that could allow attackers to disclose sensitive information, such as session authentication, and bypass MFA. The vulnerability poses a risk of unauthorized access, data breaches, and system compromise.

 

This article describes the assessment of sensitive information disclosure vulnerability in Citrix NetScaler ADC and NetScaler Gateway.

Scope FortiDAST Scripting Engine updated in version 24.1
Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

To configure the scan, it will be necessary to enable the FSE group signature 'netscaler' which will select the underlying script: ‘CVE-2023-4966 Citrix NetScaler Information Disclosure Vulnerability.’

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:
https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors