Citrix ADC and Citrix/NetScaler Gateway before 13.0-82.41, 12.1-62.23, 11.1-65.20 and Citrix ADC 12.1-FIPS before 12.1-55.238 suffer from improper access control allowing SAML authentication hijack through a phishing attack to steal a valid user session. Note that Citrix ADC or Citrix Gateway must be configured as a SAML SP or a SAML IdP for this to be possible.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.citrix.com/article/CTX297155 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-04T09:56:28.314Z
Reserved: 2020-01-28T00:00:00
Link: CVE-2020-8300

No data.

Status : Modified
Published: 2021-06-16T14:15:08.440
Modified: 2024-11-21T05:38:41.320
Link: CVE-2020-8300

No data.