Hi, thanks for your report.
On 07.11.2017 11:11, Helmut Koers wrote: > the "References" link within the above mentioned vulnerability seems to be > not valid anymore. Can anyone provide an alternative link? as this is no vulnerability but just a detection of a product it probably should have pointed to the product homepage like seen at e.g.: https://web.archive.org/web/20071103112113/http://www.citrix.com/lang/English/ps2/index.asp which is now at: https://www.citrix.com/products/netscaler-adc/ > In addition there is a NetScaler web management interface detected, but > there is no management interface running on that target. > Can I check why it has been detected? The Detection-Script is reporting such an interface if one of the following URLs: http://example.com/ http://example.com/vpn/index.html http://example.com/index.html contains one of the following strings: <title>Citrix Login</title> <title>netscaler gateway</title> (Case insensitive match) <title>citrix access gateway</title> (Case insensitive match) action="/login/do_login" action="/ws/login.pl" I guess the last two ones could be too generic and matching on your system. Could it be possible that you have a short look at the mentioned URLs to see which string is matching there? Nevertheless we will look into updating both, the URL and the pattern. Thanks again. Regards, -- Christian Fischer | PGP Key: 0x54F3CE5B76C597AD Greenbone Networks GmbH | http://greenbone.net Neumarkt 12, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460 Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner _______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
