Jump to content
Welcome to our new Citrix community!
  • NetScaler WAF mitigates risk from new MOVEit SQLi vulnerabilities


    NetScaler Cyber Threat Intelligence
    • Validation Status: Validated
      Has Video?: No

    NetScaler WAF mitigates risk from new MOVEit SQLi vulnerabilities

     

    NetScaler has new signatures available for its integrated Web App Firewall to help customers mitigate two more vulnerabilities which were reported for MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database.

    The vulnerability CVE-2023-35036 affect MOVEit Tranfer versions before 2021.0.7 (13.0.7), 2021.1.5 (13.1.5), 2022.0.5 (14.0.5), 2022.1.6 (14.1.6), and 2023.0.2 (15.0.2) and CVE-2023-35708 affects 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3). They both are related to SQL injection vulnerabilities that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer’s database. 

    The CVE-2023-35036 vulnerability is classified as critical with a CVSS of 9.1 (published on June 11, 2023), while CVE-2023-35708 (published on June 16, 2023) is awaiting classification. Customers should apply the latest NetScaler WAF signature file to help mitigate the exploitation of these vulnerabilities in their environments. NetScaler recommends WAF Signatures version 107 for CVE-2023-35036 and CVE-2023-35708.

    Mitigating both vulnerabilities

    The vendor (Progress Software) recommends that users of MOVEit Transfer immediately adhere to their published mitigation measures and incrementally apply the appropriate patches to the software to prevent exploitation of this SQLi vulnerability. 

     

    NetScaler customers can quickly implement the following recommendations to help reduce risk and lower exposure associated with this vulnerability. If you are using any of the affected MOVEit Transfer versions, NetScaler strongly recommends that you download WAF Signatures version 107 or later of the signature file and apply it to your NetScaler Web App Firewall deployments as an additional layer of protection for your applications.  Signatures are compatible with NetScaler (formerly Citrix ADC) software version 11.1, 12.0, 12.1, 13.0 and 13.1. NOTE: software versions 11.1 and 12.0 are end of life and you should consider upgrading for continued support. Learn more about the NetScaler software release lifecycle.

     

    Signature rule

    CVE ID

    Description

    998689

    CVE-2023-35036

    WEB-MISC Progress MOVEit Transfer Multiple Versions - Unauthenticated SQL Injection Vulnerability (CVE-2023-35036)

    998688

    CVE-2023-35708

    WEB-MISC Progress MOVEit Transfer Multiple Versions - Unauthenticated SQL Injection Vulnerability (CVE-2023-35708)

     

    If you already use NetScaler Web App Firewall with the signature auto-update feature enabled, verify that your signature file version is 107 or later and then follow these steps.

    1. Search your signatures for CVE-2023-35036 and CVE-2023-35708
    2. Select the results with ID 
    3. Choose “Enable Rules” and click OK

     

    NetScaler WAF Best Practices

    NetScaler recommends that WAF users always download the latest signature version, enable signature auto-update, and subscribe to receive signature alert notifications. NetScaler will continue to monitor this dynamic situation and provide updates as new mitigations become available.

    Handling false positives

    If app availability is affected by false positives that result from the above mitigation policies, relaxations can be applied. NetScaler recommends the following modifications to the policy.

     

    Modifications to NetScaler Web App Firewall Policy:

    add policy patset exception_list

    # (Example: bind policy patset exception_list “/exception_url”) 

    Prepend the existing WAF policy with:

    HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT

    # (Example :  set appfw policy my_WAF_policy q^HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT && <existing rule>^

    NOTE: Any endpoint covered by the exception_list may expose those assets to risks from CVE-2023-34362.

    Additional Information

    NetScaler Web App Firewall benefits from a single code base across all its form-factors (physical, virtual, bare-metal, and containers). This signature update applies to all form factors and deployment models of NetScaler Web App Firewall.

    Learn more about NetScaler Web app Firewall, read our alert articles and bot signature articles to learn more about NetScaler WAF signatures, and find out how you can receive signature alert notifications.

    Please join the NetScaler Community today and engage with your peers to learn more about how they are protecting their businesses with NetScaler WAF. 

     

     


    User Feedback

    Recommended Comments

    There are no comments to display.



    Create an account or sign in to comment

    You need to be a member in order to leave a comment

    Create an account

    Sign up for a new account in our community. It's easy!

    Register a new account

    Sign in

    Already have an account? Sign in here.

    Sign In Now

×
×
  • Create New...