Looking for the vulnerability index of Invicti's legacy products?
Citrix XenMobile Server Path Traversal - Vulnerability Database

Citrix XenMobile Server Path Traversal

Description

Citrix Endpoint Management (formerly known as XenMobile Server) is an enterprise mobility management solution for controlling mobile devices and applications.

A path traversal vulnerability (CWE-22) exists in the web interface of Citrix Endpoint Management that allows remote attackers to bypass directory restrictions and access files outside the intended web root. By manipulating file path parameters with sequences like '../', an unauthenticated attacker can read arbitrary files from the server's filesystem, including sensitive configuration files that may contain credentials, database connection strings, and other confidential information.

Remediation

Apply the security updates provided by Citrix immediately by upgrading to a patched version of Citrix Endpoint Management (CEM). Consult Citrix Security Bulletin CTX277457 for specific version numbers and upgrade instructions for your deployment.

The official patch removes the vulnerable file located at:

/opt/sas/sw/tomcat/inst1/webapps/ROOT/jsp/help-sb-download.jsp

After applying the patch, verify that this file has been removed from your installation. Additionally, consider implementing the following defense-in-depth measures:

- Review access logs for any suspicious file access patterns or path traversal attempts (look for '../' sequences in request parameters)
- Implement network segmentation to restrict access to the XenMobile Server management interface to authorized networks only
- Enable Web Application Firewall (WAF) rules to detect and block path traversal attempts
- Rotate all credentials and API keys that may have been exposed, particularly those stored in configuration files
- Conduct a security audit to identify any unauthorized access that may have occurred prior to patching