Share
HP ThinPro - Citrix command injection  
===============================================================================  
  
Identifiers  
-------------------------------------------------  
* CVE-2019-18909  
  
CVSSv3 score  
-------------------------------------------------  
6.1 (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)  
  
Vendor  
-------------------------------------------------  
HP - [https://www.hp.com](https://www.hp.com)  
  
Product  
-------------------------------------------------  
Deliver secure desktop virtualization that’s as comfortable for IT as it is  
for end users with the stunningly redesigned HP ThinPro. It has a bold new  
user interface and workflow refinements that make it a breeze to configure,  
manage, and use right out of the box.  
  
Affected versions  
-------------------------------------------------  
- HP ThinPro Linux 7.1  
- HP ThinPro Linux 7.0  
- HP ThinPro Linux 6.2.1  
- HP ThinPro Linux 6.2  
  
Credit  
-------------------------------------------------  
Eldar Marcussen - xen1thLabs - Software Labs  
  
Vulnerability summary  
-------------------------------------------------  
The Citrix receiver conection wrapper function does not safely handle user  
supplied data allowing an unauthenticated attacker to use commandline  
syntax to execute arbitrary commands on the device.  
  
Technical details  
------------------------------------------------  
The user supplied values provided for the domain portion of the login  
screens for `Citrix receiver` is vulnerable to command injection, an  
unauthenticated attacker can exploit this to execute commands with the  
privileges of the local user.  
  
Proof of concept  
-------------------------------------------------  
The following evidence is provided to illustrate the existence and  
exploitation:  
  
1. At the `Citrix receiver` login screen enter the following details:  
* username: \pwnt  
* password: pwnt  
* Domain should be empty  
2. Click `Connect`  
3. In the `Citrix server details` window, enter the following for domain:  
`;xterm;echo `  
4. Click `Connect`  
5. Observe that xterm spawns  
  
Solution  
-------------------------------------------------  
Contact vendor for a solution  
  
Timeline  
-------------------------------------------------  
Date | Status  
------------|-----------------------------  
19-AUG-2019 | Reported to vendor  
22-NOV-2019 | Patch available  
24-MAR-2020 | Public disclosure