Jump to content

Unbind the Mitigation policy for CVE-2019-19781


Manoj Rana

Recommended Posts

Hi Manoj,

yes you can completely remove the workaround.

 

I upgrade to 13.0.47.24 and removed the workaround. A scan shows that the netscaler is not vulnerable.

 

ns.log will now show detected attacks:

01/29/2020:06:29:55 GMT ns 0-PPE-0 : default SSLVPN Message 4066075 0 : "is_path_traversal_or_vpns_attack_request Path traversal detected |/vpn/../vpns/cfg/smb.conf|"

01/29/2020:08:27:50 GMT ns 0-PPE-0 : default SSLVPN Message 4331943 0 : "is_path_traversal_or_vpns_attack_request Path traversal detected |/vpn/js/%2E./.%2E/%76pns/cfg/smb.conf|"

 

Best regards,

Jens

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...