
Summary
CVE-2023-3519 represents a critical unauthenticated remote code execution (RCE) vulnerability found in several versions of Citrix’s NetScaler ADC and NetScaler Gateway products. The rule for this detection focuses on filtering specific HTTP requests made to the application that leverage this vulnerability. The primary conditions for triggering the rule include both GET and POST requests to designated URI paths associated with the vulnerability. GET requests are monitored for the path '/gwtest/formssso?event=start&target=', while POST requests are checked for paths like '/logon/LogonPoint/uiareas' and '/netscaler/ns_gui/'. The rule is set to analyze logs from the Cloudflare Web Application Firewall (WAF) over the previous two hours, ensuring timely detection of potential exploitation attempts.
Categories
- Web
- Application
Data Sources
- Web Credential
- Web Credential
ATT&CK Techniques
- T1190
Created: 2024-02-09