Vulnerability Name: | CVE-2020-10112 (CCN-177313) | ||||||||||||
Assigned: | 2020-03-06 | ||||||||||||
Published: | 2020-03-06 | ||||||||||||
Updated: | 2020-03-18 | ||||||||||||
Summary: | ** DISPUTED ** Citrix Gateway 11.1, 12.0, and 12.1 allows Cache Poisoning. Note: Citrix disputes this as not a vulnerability. By default, Citrix ADC only caches static content served under certain URL paths for Citrix Gateway usage. No dynamic content is served under these paths, which implies that those cached pages would not change based on parameter values. All other data traffic going through Citrix Gateway are NOT cached by default. | ||||||||||||
CVSS v3 Severity: | 5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N) 5.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:P/RL:U/RC:C)
5.0 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:C)
| ||||||||||||
CVSS v2 Severity: | 5.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N)
| ||||||||||||
Vulnerability Type: | CWE-444 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-10112 Source: MISC Type: UNKNOWN http://packetstormsecurity.com/files/156660/Citrix-Gateway-11.1-12.0-12.1-Cache-Poisoning.html Source: MISC Type: Exploit, Mailing List, Third Party Advisory http://seclists.org/fulldisclosure/2020/Mar/8 Source: XF Type: UNKNOWN citrix-cve202010112-cache-poisoning(177313) Source: CCN Type: Packet Storm Security [03-09-2020] Citrix Gateway 11.1 / 12.0 / 12.1 Cache Poisoning Source: CCN Type: Full-Disclosure Mailing List, Fri, 6 Mar 2020 13:42:13 +0100 [SYSS-2020-005] Cache Poisoning (CAPEC-141) in Citrix Gateway (CVE-2020-10112) Source: MISC Type: Vendor Advisory https://support.citrix.com/search Source: CCN Type: Citrix Web site Citrix Gateway | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||
BACK |