Signature update version 127

New signatures rules are generated for the vulnerabilities identified in the week 2024-04-04. You can download and configure these signature rules to protect your appliance from security vulnerable attacks.

Signature version

Signature version 127 applicable for NetScaler 11.1, NetScaler 12.0, Citrix ADC 12.1, Citrix ADC 13.0, NetScaler 13.1, NetScaler 14.1 platforms.

Note

Enabling Post body and Response body signature rules might affect NetScaler CPU.

Common Vulnerability Entry (CVE) insight

Following is a list of signature rules, CVE IDs, and its description.

Signature rule CVE ID Description
998512 CVE-2024-25153 WEB-MISC Fortra FileCatalyst Worflow Prior to 5.1.6 - Arbitrary File Upload Vulnerability (CVE-2024-25153)
998513 CVE-2024-24401 WEB-MISC NagiosXI Up To 2024R1.01 - SQL Injection Vulnerability (CVE-2024-24401)
998514 CVE-2024-21726 WEB-MISC Joomla! Prior to 5.0.3 and 4.4.3 - XSS Vulnerability via forceLanguage parameter (CVE-2024-21726)
998515 CVE-2024-21726 WEB-MISC Joomla! Prior to 5.0.3 and 4.4.3 - XSS Vulnerability via forcedItemType parameter (CVE-2024-21726)
998516 CVE-2024-2055 WEB-MISC Artica Proxy Prior to 4.50 - Authentication Bypass Vulnerability (CVE-2024-2055)
998517 CVE-2024-2054 WEB-MISC Artica Proxy Prior to 4.50 - Unauthenticated PHP Object Deserialization Vulnerability (CVE-2024-2054)
998518 CVE-2024-2053 WEB-MISC Artica Proxy Prior to 4.50 - Unauthenticated Arbitrary File Inclusion Vulnerability (CVE-2024-2053)
998519 CVE-2023-6063 WEB-WORDPRESS WP Fastest Cache Plugin Prior to 1.2.2 - Unauthenticated SQL Injection Vulnerability (CVE-2023-6063)
998520 CVE-2023-3550 WEB-MISC MediaWiki Prior to 1.41 - Stored XSS Vulnerability (CVE-2023-3550)
Signature update version 127