CVE-2020-7473

7.5 HIGH

📋 TL;DR

CVE-2020-7473 is an unauthenticated directory traversal vulnerability in Citrix ShareFile StorageZones Controller that allows attackers to access users' documents and folders without authentication. The vulnerability affects storage zones created with specific vulnerable versions, regardless of current product version. Organizations using affected storage zone configurations are at risk of data exposure.

💻 Affected Systems

Products:
  • Citrix ShareFile StorageZones Controller
Versions: Storage zones created with versions 5.9.0, 5.8.0, 5.7.0, 5.6.0, 5.5.0 or earlier
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Critical nuance: Vulnerability depends on the product version used when the storage zone was created, NOT the current running version. Storage zones created with vulnerable versions remain vulnerable even after upgrading to patched versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all user documents and folders stored in vulnerable storage zones, potentially including sensitive business data, personal information, and intellectual property.

🟠

Likely Case

Unauthorized access to user documents and folders, leading to data theft, privacy violations, and potential compliance breaches.

🟢

If Mitigated

Limited or no data exposure if proper network segmentation, authentication controls, and monitoring are in place.

🌐 Internet-Facing: HIGH - Storage zones exposed to the internet can be directly exploited by unauthenticated attackers without any prerequisites.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit the vulnerability, but requires network access to the storage zone controller.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation is straightforward - attackers can craft directory traversal requests without authentication. Similar to CVE-2020-8982 and CVE-2020-8983 in risk profile.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions 5.10.x and later (when storage zones are created with these versions)

Vendor Advisory: https://support.citrix.com/article/CTX269106

Restart Required: Yes

Instructions:

1. Upgrade to ShareFile StorageZones Controller 5.10.x or later. 2. Recreate all storage zones using the patched version. 3. Migrate data from old storage zones to newly created ones. 4. Restart services after migration.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to StorageZones Controller to only trusted networks and required clients

Web Application Firewall Rules

all

Implement WAF rules to block directory traversal patterns and unauthorized access attempts

🧯 If You Can't Patch

  • Isolate vulnerable storage zones from internet access and restrict to internal networks only
  • Implement strict network monitoring and alerting for unauthorized access attempts to storage zone endpoints

🔍 How to Verify

Check if Vulnerable:

Check Citrix advisory CTX269106 for specific version checks and review storage zone creation history to determine if zones were created with vulnerable versions

Check Version:

Check ShareFile StorageZones Controller version via administrative interface or PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*ShareFile*'}

Verify Fix Applied:

Verify all storage zones have been recreated using version 5.10.x or later, and test that directory traversal attempts are properly blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to document paths, multiple failed authentication attempts followed by successful directory traversal requests
  • HTTP requests containing directory traversal sequences (../, ..\) to storage zone endpoints

Network Indicators:

  • Unusual outbound data transfers from storage zone servers
  • External IP addresses accessing internal document paths without authentication

SIEM Query:

source="sharefile_logs" AND (uri="*../*" OR uri="*..\*" OR status=200 AND auth="none")

🔗 References

📤 Share & Export