I. Introduction
Citrix XenApp™It is an on-demand application delivery solution that virtualizes, centrally deploys, and manages all Windows applications in the data center, it can also serve as a service and deliver applications to all users through any device. More than 0.1 billion users around the world use XenApp, which fully proves the compatibility of the product with various applications.
Ii. Vulnerability description
1. Vulnerability Conditions
Log on to Citrix XenApp with normal User PermissionsIt is usually easy to obtain a domain member user during Intranet penetration, so this vulnerability is useful in actual penetration.
2. Vulnerability causes
Because the programs running on XenApp are actually running on the server, some resources on the server can be viewed and called on the client, so there is a security risk. This problem was accidentally discovered, and I don't know whether it is a vulnerability or the features of the product. I finally got the administrator privilege and successfully logged on to the server terminal.
3. Usage
Pay attention to the input method in the lower right corner. (There may be problems elsewhere)
Call up a printer
After this step, let's end. Execute CMD directly, and then there will be no more.
Finally, we successfully logged on to the 3389 terminal of the machine.
It is highly risky, so you must remember to set the permissions to the dead when using them.
PS: According to the small Editor, this problem is a configuration problem, which can be avoided by modifying the configuration. As to whether the default configuration is used and whether there are other vulnerabilities of the same type, you need to leave a comment.