Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Development
    • IT Management
    • Networking

    Citrix Opens Security Holes in Military, Federal Web Sites

    Written by

    Lisa Vaas
    Published October 8, 2007
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The Citrix technology that chugs away underneath Web applications is being used to put up military and government GUIs with security holes you could drive a bus through.

      Security researcher Petko D. Petkov—aka “pdp”—said in an Oct. 4 posting that his recent testing of Citrix gateways led him to “tons” of “wide-open” Citrix instances, including 10 on government domains and four on military domains.

      “The Internet is full of wide open CITRIX gateways. This is madness,” he wrote. “I mean, it is 2007 people, it shouldnt be that simple.”

      What Petkov means by “wide open” is that when searching on Google or Yahoo for files with Citrixs proprietary ICA (Independent Computing Architecture) extension, the returned files blithely hand over hints about which server is running, the underlying transport mechanism and the remote application that Citrix will open.

      Petkov said he found several “critical” applications that looked too interesting to even dare to look at among the services he managed to discover.

      “Shall we start with the Global Logistics systems or the US Government Federal Funding Citrix portals—all of them wide open and susceptible to attacks?” he wrote. “With a similar success, attackers can perform just simple port scans for service port 1494 [a TCP port used by Citrix Presentation Servers ICA Client].”

      Petkov compares Citrix hacking to “the old days with NetBIOS” in that its simple, its malicious, and its “highly effective.”

      Click here to read more about a security breach of the U.S. Consulate General in St. Petersburg, Russia.

      Citrix technology is also ubiquitous, with Windows desktops and applications relying on MetaFrame—now called Citrix Presentation Server. The ICA protocol in question specifies a method of passing data between server and clients.

      Its not bound to any particular platform, but products that use the protocol—including Citrixs WinFrame and Citrix Presentation Server—are used to allow Windows applications to be run on a Windows server and for supported clients to access the applications. ICA is also supported on multiple Unix server platforms and can be used for access to applications running on those platforms.

      “And the problem is that CITRIX is pretty useful,” Petkov wrote in the posting. “Here is a dilemma for you: Lets say that you have a pretty stable desktop [application that] you would like to [make] available on the Web. What you gonna do? Port it to XHTML, JavaScript and CSS? No way! You are most likely going to put it over CITRIX.”

      Petkov posted a video that demonstrates a Citrix attack with simple enumeration exercises along with a script he says can be used to brute-force the Windows/Netware logon and which can be modified to work against Citrix SSL authorization as well. Petkov also posted on Oct. 5 a script to fine-tune connections when security researchers want to try out various Citrix communication mechanisms and connection options, and a script to use ICAClient ActiveX controller to enumerate remote applications, servers and farms.

      Citrix had not responded to queries by the time this article posted.

      Participants on the Full Disclosure security mailing list noted, however, that its not that Citrix cant be secured—given a competent administrator, that is.

      “Id recommend using terminal services over Citrix any day of the week for hosting mature apps on a big box, but thats just my bias,” wrote a poster with the moniker “Geoff.” “Citrix is able to be secured, but thats like everything else in computing: the admin needs a brain.”

      Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.

      Lisa Vaas
      Lisa Vaas
      Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×