NetScaler WAF Signatures Update v137
NetScaler has released a new version of its integrated Web App Firewall signatures to help customers mitigate several CVEs with varying CVSS scores.
CVE-2024-5932: “GiveWP” by StellarWP is a WordPress plugin widely used for donation and fundraising management. With over 100,000 active installations, the plugin is susceptible to PHP Object Injection via in all versions up to, and including, 3.14.1. The issue affects the “donation form” because the plugin does not validate serialized input in the “give_title” parameter field. Unauthenticated attackers can exploit this weakness to execute arbitrary commands on the server, potentially resulting in complete site takeover or data destruction.
CVE-2024-6172: Email Subscribers” by Icegram Express is a WordPress plugin widely used for email marketing, subscriber list management, and newsletter distribution. With over 80,000 active installations, the plugin is susceptible to time-based SQL Injection via the “db” parameter in all versions up to, and including, 5.7.25. Unauthenticated attackers can exploit this weakness by injecting malicious SQL code, potentially granting access to sensitive information stored in the database.
Signatures included in v137:
Signature rule |
CVE ID |
Description |
998437 |
CVE-2024-7297 |
WEB-MISC Langflow Prior to 1.0.13 - Privilege Escalation Vulnerability (CVE-2024-7297) |
998438 |
CVE-2024-6172 |
WEB-WORDPRESS Email Subscribers by Icegram Express Plugin Before 5.7.26 - SQLi Vulnerability unsubscribe_lists (CVE-2024-6172) |
998439 |
CVE-2024-6172 |
WEB-WORDPRESS Email Subscribers by Icegram Express Plugin Before 5.7.26 - SQLi Vulnerability Via db (CVE-2024-6172) |
998440 |
CVE-2024-5932 |
WEB-MISC WordPress Plugin GiveWP Prior To 3.14.2 - Deserialization of Untrusted Data Vulnerability (CVE-2024-5932) |
998441 |
CVE-2024-5932 |
WEB-MISC WordPress Plugin GiveWP Prior To 3.14.2 - Deserialization of Untrusted Data Vulnerability Via Ajax (CVE-2024-5932) |
998442 |
CVE-2024-33536 |
WEB-MISC Zimbra Collaboration - XSS Vulnerability via res (CVE-2024-33536) |
998443 |
CVE-2024-33533, CVE-2024-33535 |
WEB-MISC Zimbra Collaboration - Local File Inclusion and XSS Vulnerabilities (CVE-2024-33533, CVE-2024-33535) |
998444 |
CVE-2024-22263 |
WEB-MISC Spring Cloud Data Flow Prior To 2.11.3 - Unauthenticated Arbitrary File Write Vulnerability (CVE-2024-22263) |
NetScaler customers can quickly import the above signatures to help reduce risk and lower exposure associated with these vulnerabilities. Signatures are compatible with NetScaler (formerly Citrix ADC) software version 11.1, 12.0, 12.1, 13.0 and 13.1. NOTE: Software versions 11.1 and 12.0 are end of life, and you should consider upgrading for continued support. Learn more about the NetScaler software release lifecycle.
If you are already using NetScaler Web App Firewall with the signature auto-update feature enabled, verify that your signature file version is 137 or later and then follow these steps.
- Search your signatures for <number>
- Select the results with ID
- Choose “Enable Rules” and click OK
NetScaler WAF Best Practices
NetScaler recommends that WAF users always download the latest signature version, enable signature auto-update, and subscribe to receive signature alert notifications. NetScaler will continue to monitor this dynamic situation and provide updates as new mitigations become available.
Handling false positives
If app availability is affected by false positives that result from the above mitigation policies, relaxations can be applied. NetScaler recommends the following modifications to the policy.
Modifications to NetScaler Web App Firewall Policy:
add policy patset exception_list
# (Example: bind policy patset exception_list “/exception_url”)
Prepend the existing WAF policy with:
HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT
# (Example : set appfw policy my_WAF_policy q^HTTP.REQ.URL.CONTAINS_ANY(“exception_list”).NOT && <existing rule>^
NOTE: Any endpoint covered by the exception_list may expose those assets to risks
Additional Information
NetScaler Web App Firewall benefits from a single code base across all its form-factors (physical, virtual, bare-metal, and containers). This signature update applies to all form factors and deployment models of NetScaler Web App Firewall.
Learn more about NetScaler Web app Firewall. Read our alert articles and bot signature articles to learn more about NetScaler WAF signatures, and find out how you can receive signature alert notifications.
Please join the NetScaler Community today and engage with your peers to learn more about how they are protecting their businesses with NetScaler WAF.
Recommended Comments
There are no comments to display.
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now