Hi,

thanks for your report.

On 07.11.2017 11:11, Helmut Koers wrote:
> the "References" link within the above mentioned vulnerability seems to be 
> not valid anymore. Can anyone provide an alternative link?

as this is no vulnerability but just a detection of a product it
probably should have pointed to the product homepage like seen at e.g.:

https://web.archive.org/web/20071103112113/http://www.citrix.com/lang/English/ps2/index.asp

which is now at:

https://www.citrix.com/products/netscaler-adc/

> In addition there is a NetScaler web management interface detected, but 
> there is no management interface running on that target.
> Can I check why it has been detected?

The Detection-Script is reporting such an interface if one of the
following URLs:

http://example.com/
http://example.com/vpn/index.html
http://example.com/index.html

contains one of the following strings:

<title>Citrix Login</title>
<title>netscaler gateway</title> (Case insensitive match)
<title>citrix access gateway</title> (Case insensitive match)
action="/login/do_login"
action="/ws/login.pl"

I guess the last two ones could be too generic and matching on your
system. Could it be possible that you have a short look at the mentioned
URLs to see which string is matching there?

Nevertheless we will look into updating both, the URL and the pattern.

Thanks again.

Regards,

-- 

Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone Networks GmbH | http://greenbone.net
Neumarkt 12, 49074 Osnabrück, Germany | AG Osnabrück, HR B 202460
Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to