{"id":555,"date":"2021-06-09T09:22:01","date_gmt":"2021-06-09T07:22:01","guid":{"rendered":"https:\/\/certitude.consulting\/blog\/?p=555"},"modified":"2021-11-30T10:29:53","modified_gmt":"2021-11-30T08:29:53","slug":"citrix-adc-cve-2020-8300-2","status":"publish","type":"post","link":"https:\/\/certitude.consulting\/blog\/en\/citrix-adc-cve-2020-8300-2\/","title":{"rendered":"Citrix ADC &#038; Citrix Gateway Vulnerability CVE-2020-8300"},"content":{"rendered":"\n<p><strong>Update<\/strong>: Details regarding this vulnerability can be found here: <a href=\"https:\/\/certitude.consulting\/blog\/en\/citrix-header-injection-2\/\">https:\/\/certitude.consulting\/blog\/en\/citrix-header-injection-2\/<\/a><\/p>\n\n\n\n<p>We have identified an issue in Citrix ADC and Citrix Gateway and worked with Citrix to resolve it. Citrix has released a <a rel=\"noreferrer noopener\" href=\"https:\/\/support.citrix.com\/article\/CTX297155\" target=\"_blank\">patch that addresses the issue<\/a> as well as an <a rel=\"noreferrer noopener\" href=\"https:\/\/support.citrix.com\/article\/CTX316577\" data-type=\"URL\" data-id=\"https:\/\/support.citrix.com\/article\/CTX316577\" target=\"_blank\">article describing the configuration changes<\/a> that have in addition to be made in order to mitigate it. <\/p>\n\n\n\n<p>We will release further details regarding this vulnerability once affected organizations have had time to resolve it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update: Details regarding this vulnerability can be found here: https:\/\/certitude.consulting\/blog\/en\/citrix-header-injection-2\/ We have identified an issue in Citrix ADC and Citrix Gateway and worked with Citrix to resolve it. Citrix has released a patch that addresses the issue as well as an article describing the configuration changes that have in addition to be made in order [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":608,"comment_status":"closed","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60,103],"tags":[90,142,86,84],"class_list":["post-555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-analysis","category-vulnerability-research-en","tag-citrix","tag-cve-2020-8300","tag-research","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/comments?post=555"}],"version-history":[{"count":3,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/555\/revisions"}],"predecessor-version":[{"id":885,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/posts\/555\/revisions\/885"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media\/608"}],"wp:attachment":[{"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/media?parent=555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/categories?post=555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/certitude.consulting\/blog\/wp-json\/wp\/v2\/tags?post=555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}