CVE-2010-4566
Published Jan 14, 2011
Last updated 13 years ago
Overview
- Description
- The web authentication form in the NT4 authentication component in Citrix Access Gateway Enterprise Edition 9.2-49.8 and earlier, and the NTLM authentication component in Access Gateway Standard and Advanced Editions before Access Gateway 5.0, allows attackers to execute arbitrary commands via shell metacharacters in the password field.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:access_gateway:*:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D5E4A81-EDA7-4C0D-A02D-A0785081392D", "versionEndIncluding": "9.2-49.8" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:.8.0:m50.3:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4990990C-9647-4A31-894E-F43652FFF4AB" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:8.0:m48.7:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1275E2DF-5D06-4CE3-BAB9-7F2AFEC2F5A9" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:8.0:m49.2:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "766AB736-FA79-4E70-A0F6-3C5D071A1AD8" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:8.0:m59.1:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46ECBD0E-0873-4A82-AE09-46CA4A54C104" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:8.1-69.4:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BA9F8079-0A27-47F3-AA20-376D53C3C2AB" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:9.0.71.3:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8D430557-6BBA-45B9-8DB6-B72641EF6C69" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:9.1-104.5:*:enterprise:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "398E63F4-F325-48FC-9BA2-4FBE5D15C3FE" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:citrix:access_gateway:4.5:*:advanced:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E674A101-814E-4954-B344-663AF49FED35" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.5:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C019102F-CED4-4911-9B02-8D88AF9796DD" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.5:hf1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCABF20E-43A8-494B-AB47-B2C73C497B51" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.5:hf1:advanced:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44665598-C710-4EED-ACCB-D5B69644D537" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.5.5:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "94618DF7-4882-4205-89F2-DD8B22BB9D9A" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.5.6:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3EAEF2D7-EBE5-4B14-AE70-24B2C4770287" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.5.7:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98CF7119-F625-4A4C-838A-216D05B2763D" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.6.1:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BBA9141-DD1E-40D8-835F-6B7290632747" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.6.2:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C96FF50F-7498-4469-9DE2-F99717BAEC56" }, { "criteria": "cpe:2.3:a:citrix:access_gateway:4.6.3:*:standard:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1BDE88C1-29B3-44F3-82AD-5FFD74656B3A" } ], "operator": "OR" } ] } ]