First published: Fri Oct 28 2016(Updated: )
Unauthorized redirect vulnerability in Citrix NetScaler ADC before 10.1 135.8, 10.5 61.11, 11.0 65.31/65.35F and 11.1 47.14 allows a remote attacker to steal session cookies of a legitimate AAA user via manipulation of Host header.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citrix Application Delivery Controller Firmware | <=10.1 | |
Citrix Application Delivery Controller Firmware | =10.5 | |
Citrix Application Delivery Controller Firmware | =11.0 | |
Citrix Application Delivery Controller Firmware | =11.1 | |
NetScaler ADC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9028 has a high severity rating as it allows remote attackers to steal session cookies, leading to unauthorized access.
To fix CVE-2016-9028, upgrade Citrix NetScaler ADC to the recommended versions or later as specified by the vendor's advisory.
CVE-2016-9028 affects Citrix NetScaler ADC versions before 10.1 135.8, 10.5 61.11, 11.0 65.31/65.35F, and 11.1 47.14.
CVE-2016-9028 enables an unauthorized redirect attack which can lead to session cookie theft for legitimate users.
The consequences of CVE-2016-9028 include unauthorized access to sensitive information and user sessions, which can compromise user accounts.