Emerging Threatcriticaltest

Citrix Netscaler Attack CVE-2019-19781

Detects CVE-2019-19781 exploitation attempt against Citrix Netscaler, Application Delivery Controller and Citrix Gateway Attack

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Arnim Rupp, Florian Roth (Nextron Systems)Created Thu Jan 02Updated Mon Jan 02ac5a6409-8c89-44c2-8d64-668c29a2d7562019
Emerging Threat
Active Threat

Developed to detect an active or emerging threat. Prioritize investigation of any alerts and correlate with threat intelligence.

Log Source
Web Server Log
CategoryWeb Server Log← raw: webserver

HTTP access logs from web servers capturing request paths, methods, and status codes.

Definition

Make sure that your Netscaler appliance logs all kinds of attacks (test with http://your-citrix-gw.net/robots.txt). The directory traversal with ../ might not be needed on certain cloud instances or for authenticated users, so we also check for direct paths. All scripts in portal/scripts are exploitable except logout.pl.

Detection Logic
Detection Logic2 selectors
detection:
    selection_cs:
        - cs-uri-query|contains: '/../vpns/'
        - cs-uri-query|endswith: '/vpns/cfg/smb.conf'
    selection_csall:
        cs-uri-query|contains|all:
            - '/vpns/portal/scripts/'
            - '.pl'
    condition: 1 of selection_*
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

MITRE ATT&CK

Other

cve.2019-19781detection.emerging-threats
Rule Metadata
Rule ID
ac5a6409-8c89-44c2-8d64-668c29a2d756
Status
test
Level
critical
Type
Emerging Threat
Created
Thu Jan 02
Modified
Mon Jan 02
Path
rules-emerging-threats/2019/Exploits/CVE-2019-19781/web_cve_2019_19781_citrix_exploit.yml
Raw Tags
attack.initial-accessattack.t1190cve.2019-19781detection.emerging-threats
View on GitHub