#WebShells
Hackers Exploiting Critical Citrix NetScaler Zero-day Flaw To Deploy Webshells - https://cybersecuritynews.com/citrix-netscaler-hackers-webshells/
Hackers Exploiting Critical Citrix NetScaler Zero-day Flaw To Deploy Webshells
<p>The Cybersecurity and Infrastructure Security Agency (CISA) recently released a security advisory that indicates that threat actors have been exploiting a <a href="https://gbhackers.com/zero-day-vulnerability-citrix-netscaler/">Zero-day vulnerability in Citrix</a> ADC (Application Delivery Controller) and NetScaler Gateways. </p> <p>A vulnerability was discovered that enabled the placement of a webshell on a non-production environment of a critical infrastructure organization. This was reported to CISA and Citrix Systems.</p> <p>Threat actors exploited an unauthenticated, remote code execution vulnerability to drop these webshells on the environment and also attempted to laterally move to the domain controller. However, it was blocked due to network-segmentation controls.</p> <h2><strong><a href="https://gbhackers.com/citrix-secure-access-flaw/">CVE-2023-3519</a>: Code Injection Vulnerability</strong></h2> <p>This vulnerability can be exploited by a threat actor if the appliance is configured as a Gateway (VPN Virtual Server, RDP proxy etc.,) or Authentication, Authorization and Auditing (AAA) Server. The CVSS Score for this vulnerability is given as 9.8 (<strong>Critical</strong>).</p> <p>Citrix systems has <a href="https://support.citrix.com/article/CTX561482/citrix-adc-and-citrix-gateway-security-bulletin-for-cve20233519-cve20233466-cve20233467">released patches</a> for fixing this vulnerability. </p> <h2><strong>Affected Products</strong></h2> <ul> <li>NetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.13 </li> <li>NetScaler ADC and NetScaler Gateway 13.0 before 13.0-91.13</li> <li>NetScaler ADC and NetScaler Gateway version 12.1, now end of life</li> <li>NetScaler ADC 13.1-FIPS before 13.1-37.159</li> <li>NetScaler ADC 12.1-FIPS before 12.1-65.36</li> <li>NetScaler ADC 12.1-NDcPP before 12.65.36</li> </ul> <h2><strong>Technical Analysis</strong></h2> <p>Threat actors uploaded a malicious TGZ file on the ADC appliance, which consisted of setuid binary, generic webshell and discovery script for conducting an SMB scan on the ADC. Furthermore, AD enumeration and data exfiltration were performed with the webshell. Additional activities performed by the threat actors include,</p> <ul> <li>Viewing of NetScaler Configuration file (Contains encrypted passwords)</li> <li>Viewing NetScaler Decryption Keys (Used for decrypting extracted passwords from Config file)</li> <li>Conducting LDAP search via decrypted AD credentials and extracted data like Users, Computers, Groups, Subnets, Organisational Units, Contacts, Partitions, and Trusts </li> </ul> <div> <blockquote><p lang="en" dir="ltr"><a href="https://twitter.com/hashtag/Citrix?src=hash&amp;ref_src=twsrc%5Etfw">#Citrix</a> <a href="https://twitter.com/hashtag/Vulnerability?src=hash&amp;ref_src=twsrc%5Etfw">#Vulnerability</a><br><img src="https://s.w.org/images/core/emoji/14.0.0/72x72/1f6a8.png" alt="🚨">We have developed a simple scan script for CVE-2023-3519. It looks for HTTP header "Last Modified" <img src="https://s.w.org/images/core/emoji/14.0.0/72x72/23f2.png" alt="⏲">timestamps from known patched systems that we have collected as they are always the same. It may not work with reverse proxies or heavily modified pages. <a href="https://t.co/Jcvj7L2LSl">pic.twitter.com/Jcvj7L2LSl</a></p>— Deutsche Telekom CERT (@DTCERT) <a href="https://twitter.com/DTCERT/status/1682032701430452233?ref_src=twsrc%5Etfw">July 20, 2023</a></blockquote> </div> <div> <blockquote><p lang="en" dir="ltr">Now sharing info on likely CVE-2023-3519 vulnerable Citrix ADC/Gateway instances in our Vulnerable HTTP report: <a href="https://t.co/qxv0Gv6cAK">https://t.co/qxv0Gv6cAK</a><br><br>At least 11170 unique IPs found, most in the US (4.1K).<br><br>Make sure to patch: <a href="https://t.co/EHskF4kLdt">https://t.co/EHskF4kLdt</a><br><br>Dashboard stats: <a href="https://t.co/zbdpCDDaOF">https://t.co/zbdpCDDaOF</a> <a href="https://t.co/bJs1e32dIX">pic.twitter.com/bJs1e32dIX</a></p>— Shadowserver (@Shadowserver) <a href="https://twitter.com/Shadowserver/status/1682022404825182214?ref_src=twsrc%5Etfw">July 20, 2023</a></blockquote> </div> <p>Other queries by the threat actors were unsuccessful as the organization implemented a segmented environment for the ADC appliance. The exfiltration queries that failed are as follows</p> <ul> <li>Execution of subnet-wide curl command for scanning internal network as well as checking for potential lateral movement targets</li> <li>Outbound network connectivity with a ping command to google.com</li> <li>Subnet-wide host commands for DNS lookup </li> </ul> <p>Nevertheless, the threat actors also deleted the authorization config file <em>/etc/auth.conf</em> to prevent privileged users from logging in remotely. If an attempt by the organization was made to regain access to the server by rebooting into single user mode, it would delete the threat actors’ artifacts.</p> <p>CISA has released a <a href="https://www.cisa.gov/sites/default/files/2023-07/aa23-201a_csa_threat_actors_exploiting_citrix-cve-2023-3519_to_implant_webshells.pdf">complete report</a> about the MITRE ATT&amp;CK framework, detection methods, mitigation and prevention steps. It is recommended for organizations to follow them and mitigate these kinds of breaches by threat actors.</p> <p>The post <a href="https://cybersecuritynews.com/citrix-netscaler-hackers-webshells/">Hackers Exploiting Critical Citrix NetScaler Zero-day Flaw To Deploy Webshells</a> appeared first on <a href="https://cybersecuritynews.com">Cyber Security News</a>.</p>
cybersecuritynews.com
July 21, 2023 at 3:06 PM
I'll start by leaking the source code of the Cat website from an exposed git. Then there's XSS, SQLi, webshells, and an interesting Gitea CVE.
HTB: Cat
I’ll leak the source code for the Cat website from an exposed git directory. I’ll use XSS to capture the admin user’s cookie, and then a SQL injection to get a webshell on the host and remote code execution. I’ll pivot to the next user by cracking a hash in the web application database. I’ll find the next user’s password in the Apache access logs. Finally, I’ll exploit a vulnerability in a private Gitea instance to get root.
0xdf.gitlab.io
July 5, 2025 at 3:00 PM
He sells webshells on the webshore
April 30, 2025 at 9:34 AM
Webshells are pretty common across the spectrum of adversaries, but don't get as much shine as the fancy shmancy backdoors (read: Cobalt Strike Loaders)

We looked at some older custom tooling from APT34 and Turla, and some open source tools like ASPXSpy, and SharpyShell
December 1, 2024 at 6:57 AM
We share data on known compromised instances with webshells here - https://shadowserver.org/what-we-do/network-reporting/compromised-website-report/
August 7, 2023 at 9:28 AM
Did you see that recent Watchtowr blog about exactly that? The theory that webshells have backdoors and they found oodles of them. Amazing.
February 9, 2025 at 2:07 AM
It's probably strange because I've been thinking about detecting webshells in general, and not specific instances of webshells.

I hadnt realized that was new, thanks!
July 27, 2025 at 6:39 PM
Commonly Probed Webshell URLs, (Sun, Mar 9th)

Looking over some weblogs on my way back from class in Baltimore, I feel a reminder is appropriate that (a) weblogs are still a thing and (b) what some of the common webshells are that attackers are looking for.

#hackernews #news
Commonly Probed Webshell URLs, (Sun, Mar 9th)
Looking over some weblogs on my way back from class in Baltimore, I feel a reminder is appropriate that (a) weblogs are still a thing and (b) what some of the common webshells are that attackers are looking for.
isc.sans.edu
March 10, 2025 at 3:22 PM
while there are likely still webshells out there passing data in plaintext in the URI path, cookie, or body, hope this can implore some defenders to begin mining web server access logs for Cookies to find badness (especially if no EDR or other tech is deployed)
December 1, 2024 at 7:28 AM
SAP NetWeaver 0-Day Vulnerability Exploited in the Wild to Deploy Webshells.

cybersecuritynews.com/sap-netweave...
April 28, 2025 at 7:27 PM
[BleepingComputer]Hackers exploit ProjectSend flaw to backdoor exposed servers - BleepingComputer Threat actors are using public exploits for a critical authentication bypass flaw in ProjectSend to upload webshells and gain remote access to servers.
November 29, 2024 at 9:00 PM
ID: CVE-2024-10201
CVSS V3.1: HIGH
Administrative Management System from Wellchoose does not properly validate uploaded file types, allowing remote attackers with regular privileges to upload and execute webshells.
#security #infosec #cve-alert
nvd.nist.gov
October 21, 2024 at 4:15 AM
CVE-2025-31324 (CVSS 10): Zero-Day in SAP NetWeaver Exploited in the Wild to Deploy Webshells and C2 Frameworks
Details: securityonline.info/cve-2025-313...
CVE-2025-31324 (CVSS 10): Zero-Day in SAP NetWeaver Exploited in the Wild to Deploy Webshells and C2 Frameworks
CVE-2025-31324 lets attackers exploit SAP NetWeaver to upload webshells and deploy C2 tools like Brute Ratel, affecting patched enterprise systems.
securityonline.info
April 25, 2025 at 6:18 AM
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details
https://isc.sans.edu/podcastdetail/9630
September 26, 2025 at 4:05 AM
📌 NeoPI: A Powerful Tool for Detecting and Cleaning Up Webshells https://www.cyberhub.blog/article/13755-neopi-a-powerful-tool-for-detecting-and-cleaning-up-webshells
NeoPI: A Powerful Tool for Detecting and Cleaning Up Webshells
NeoPI is a specialized tool designed to detect and remove webshells, which are malicious scripts or executables uploaded by attackers to maintain persistent access to compromised web servers. Webshells are a common post-exploitation tool, allowing attackers to execute commands, manipulate files, and move laterally within networks. NeoPI's ability to automate the detection and removal process is significant, as it reduces the window of opportunity for attackers and enhances the security posture of organizations. The tool likely employs sophisticated detection mechanisms such as signature-based detection, heuristic analysis, or machine learning to identify webshells. This automation is crucial for large-scale environments where manual detection can be time-consuming and error-prone. The introduction of tools like NeoPI can greatly improve incident response capabilities, enabling security teams to respond more quickly to incidents and reduce potential damage. However, it's important to note that no tool is perfect. Webshells can be highly obfuscated or customized to evade detection. Therefore, NeoPI should be part of a layered defense strategy that includes regular vulnerability assessments, intrusion detection systems, and robust logging and monitoring. For cybersecurity professionals, integrating tools like NeoPI into their security operations can significantly reduce the risk posed by webshells. Regular scans, combined with other security measures, can help identify compromises early, before they can be leveraged for more damaging attacks. Keeping the tool updated with the latest signatures and detection algorithms is crucial for maintaining its effectiveness. In conclusion, NeoPI represents a valuable addition to the cybersecurity toolkit, offering enhanced detection and removal capabilities for webshells. However, it should be used in conjunction with other security measures to ensure comprehensive protection against cyber threats.
www.cyberhub.blog
September 29, 2025 at 12:40 AM
Urgent: CISA & FBI warn of exploited Ivanti vulnerabilities (CVE-2024-8963, CVE-2024-8190, CVE-2024-9379, CVE-2024-9380). Patch immediately; attacker gains RCE, steals credentials, implants webshells. Assume compromise.#IvantiVulnerabilityEmergency
January 23, 2025 at 5:04 PM
SAP NetWeaver 0-day Vulnerability Exploited in the Wild to Deploy Webshells.

cybersecuritynews.com/sap-netweave...
April 25, 2025 at 6:09 AM
SAP NetWeaver 0-day Vulnerability Exploited in the Wild to Deploy Webshells
SAP NetWeaver 0-day Vulnerability Exploited in the Wild to Deploy Webshells
A wave of targeted cyberattacks has exposed a previously unknown vulnerability in SAP NetWeaver, allowing attackers to deploy malicious JSP webshells and gain unauthorized access to enterprise systems, even those running the latest patches.
cybersecuritynews.com
April 25, 2025 at 7:09 AM
Webshells Hiding in .well-known Places, (Thu, Sep 25th)

Ever so often, I see requests for files in .well-known recorded by our honeypots. As an example:

#hackernews #news
Webshells Hiding in .well-known Places, (Thu, Sep 25th)
Ever so often, I see requests for files in .well-known recorded by our honeypots. As an example:
isc.sans.edu
September 26, 2025 at 3:29 PM
Commvault’s Comedy of Errors: Vulnerability Exploited by Nation-State, But No Backup Drama!

Commvault vulnerability exploited remotely! Learn how to protect against CVE-2025-3928 with IoCs and best practices. Don't let webshells crash your party!
thenimblenerd.com?p=1044336
Commvault’s Comedy of Errors: Vulnerability Exploited by Nation-State, But No Backup Drama!
Commvault has disclosed IoCs linked to CVE-2025-3928, a vulnerability in its software. The issue, now part of CISA's KEV catalog, allows remote exploitation to execute webshells, potentially compromising systems. A previously exploited zero-day, this flaw impacts certain Commvault versions. The company is actively assisting affected clients and enhancing security measures.
thenimblenerd.com
May 1, 2025 at 12:17 PM
🚨 Citrix/NetScaler Zero-Day Under Attack 🚨
CVE-2025-7775 is being exploited right now in the wild, dropping webshells + giving attackers persistent access.

Citrix says: no workarounds, just patch immediately.

Do you trust Citrix after so many zero-days in 2025?
August 27, 2025 at 7:33 AM
🧵 What’s happening:
– The three unique attacker clusters are targeting tech, critical infrastructure and architecture and engineering firms
– Two clusters deployed webshells designed to execute commands or collect sensitive system information. Another operated filelessly.
July 21, 2025 at 11:16 PM