Vulnerability Description
The Management Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.1 before 10.1.132.8, 10.5 before Build 56.15, and 10.5.e before Build 56.1505.e allows remote authenticated users to execute arbitrary shell commands via shell metacharacters in the filter parameter to rapi/ipsec_logs.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citrix | Netscaler Application Delivery Controller Firmware | 10.1 |
| Citrix | Netscaler Gateway Firmware | 10.1.120.1316.e |
Related Weaknesses (CWE)
References
- http://security-assessment.com/files/documents/advisory/Citrix-Netscaler-Final.p
- http://support.citrix.com/article/CTX201149
- http://www.securityfocus.com/bid/75505
- http://www.securitytracker.com/id/1032762
- http://security-assessment.com/files/documents/advisory/Citrix-Netscaler-Final.p
- http://support.citrix.com/article/CTX201149
- http://www.securityfocus.com/bid/75505
- http://www.securitytracker.com/id/1032762
FAQ
What is CVE-2015-5080?
CVE-2015-5080 is a vulnerability with a CVSS score of 9.0 (HIGH). The Management Interface in Citrix NetScaler Application Delivery Controller (ADC) and NetScaler Gateway 10.1 before 10.1.132.8, 10.5 before Build 56.15, and 10.5.e before Build 56.1505.e allows remot...
How severe is CVE-2015-5080?
CVE-2015-5080 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5080?
Check the references section above for vendor advisories and patch information. Affected products include: Citrix Netscaler Application Delivery Controller Firmware, Citrix Netscaler Gateway Firmware.