- External, unauthenticated exploit for memory leak in Citrix NetScaler Gateway & AAA Virtual Server
- Leverages insufficient input validation in the web app to fire the payload, and TOCTOU Race Conditions to scrape variables in memory
site:<targetDomainSuffix> intitle:"Netscaler AAA" | intitle:"Citrix Gateway"
domain.suffix=="<targetDomainSuffix>" and header.server="snow_adc"
bash CVE-2025-5777.sh <targetDomain>
Objective - Pivot externally without credentials -> internal with low priv user credentials over VPN
- Inspect response bodies and experiment with decoding and escaping to gain visibility on the asset - log files, etc.
- Inspect response headers, repeat til capture of active user session cookies in memory - Demonstration by horizon3.ai
- Authenticate to the target domain