First published: Fri Apr 03 2015(Updated: )
The Nitro API in Citrix NetScaler before 10.5 build 52.3nc uses an incorrect Content-Type when returning an error message, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the file_name JSON member in params/xen_hotfix/0 to nitro/v1/config/xen_hotfix.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix NetScaler SD-WAN | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2839 is classified as a medium severity vulnerability.
To fix CVE-2015-2839, it is recommended to update Citrix NetScaler to a version that is patched for this vulnerability.
CVE-2015-2839 allows remote attackers to conduct cross-site scripting (XSS) attacks.
CVE-2015-2839 affects Citrix NetScaler version 10.5 before build 52.3nc.
CVE-2015-2839 exploits the params/xen_hotfix/0 to nitro/v1/config/xen_hotfix endpoint.