CVE-2020-7473
📋 TL;DR
CVE-2020-7473 is an unauthenticated directory traversal vulnerability in Citrix ShareFile StorageZones Controller that allows attackers to access users' documents and folders without authentication. The vulnerability affects storage zones created with specific vulnerable versions, regardless of current product version. Organizations using affected storage zone configurations are at risk of data exposure.
💻 Affected Systems
- Citrix ShareFile StorageZones Controller
📦 What is this software?
Sharefile Storagezones Controller by Citrix
Sharefile Storagezones Controller by Citrix
Sharefile Storagezones Controller by Citrix
Sharefile Storagezones Controller by Citrix
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of all user documents and folders stored in vulnerable storage zones, potentially including sensitive business data, personal information, and intellectual property.
Likely Case
Unauthorized access to user documents and folders, leading to data theft, privacy violations, and potential compliance breaches.
If Mitigated
Limited or no data exposure if proper network segmentation, authentication controls, and monitoring are in place.
🎯 Exploit Status
Exploitation is straightforward - attackers can craft directory traversal requests without authentication. Similar to CVE-2020-8982 and CVE-2020-8983 in risk profile.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions 5.10.x and later (when storage zones are created with these versions)
Vendor Advisory: https://support.citrix.com/article/CTX269106
Restart Required: Yes
Instructions:
1. Upgrade to ShareFile StorageZones Controller 5.10.x or later. 2. Recreate all storage zones using the patched version. 3. Migrate data from old storage zones to newly created ones. 4. Restart services after migration.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to StorageZones Controller to only trusted networks and required clients
Web Application Firewall Rules
allImplement WAF rules to block directory traversal patterns and unauthorized access attempts
🧯 If You Can't Patch
- Isolate vulnerable storage zones from internet access and restrict to internal networks only
- Implement strict network monitoring and alerting for unauthorized access attempts to storage zone endpoints
🔍 How to Verify
Check if Vulnerable:
Check Citrix advisory CTX269106 for specific version checks and review storage zone creation history to determine if zones were created with vulnerable versions
Check Version:
Check ShareFile StorageZones Controller version via administrative interface or PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*ShareFile*'}
Verify Fix Applied:
Verify all storage zones have been recreated using version 5.10.x or later, and test that directory traversal attempts are properly blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to document paths, multiple failed authentication attempts followed by successful directory traversal requests
- HTTP requests containing directory traversal sequences (../, ..\) to storage zone endpoints
Network Indicators:
- Unusual outbound data transfers from storage zone servers
- External IP addresses accessing internal document paths without authentication
SIEM Query:
source="sharefile_logs" AND (uri="*../*" OR uri="*..\*" OR status=200 AND auth="none")