vendor:
Citrix Netscaler NS10.5
by:
BGA Security
7.5
CVSS
HIGH
HTTP Header Pollution
N/A
CWE
Product Name: Citrix Netscaler NS10.5
Affected Version From: NS10.5
Affected Version To: NS10.5
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: NetScaler NS10.5: Build 50.9.nc
2015
Citrix Netscaler NS10.5 WAF Bypass via HTTP Header Pollution
BGA Security Team discovered an HTTP Header Pollution vulnerability in Citrix Netscaler NS10.5 (other versions may be vulnerable). It is possible to bypass Netscaler WAF using a method which may be called HTTP Header Pollution. The setup: An Apache web server with default configuration on Windows (XAMPP). A SOAP web service which has written in PHP and vulnerable to SQL injection. Netscaler WAF with SQL injection rules. First request: ‘ union select current_user,2# - Netscaler blocks it. Second request: The same content and an additional HTTP header which is “Content-Type: application/octet-stream” - Netscaler allows it.
Mitigation:
N/A