Task 1 of 4
Real Breach: Citrix NetScaler — CVE-2019-19781
## A Path Traversal That Hit 80,000 Companies
In December 2019, a path traversal vulnerability was disclosed in Citrix Application Delivery Controller (ADC) and Citrix Gateway — products used by roughly 80,000 organisations worldwide including banks, hospitals, and government agencies.
The vulnerability: an unauthenticated attacker could send a crafted URL like:
`/vpn/../vpns/cfg/smb.conf`
The `../` sequences navigated out of the intended web directory into the application config. From there, attackers could read credentials, session tokens, and configuration files — and chain the vulnerability into remote code execution.
Exploitation started within 24 hours of the PoC being published. Ransomware groups and nation-state actors used it to compromise targets before patches were applied. The UK's NCSC reported widespread exploitation.
---
### Why Path Traversal Happens
Developers build file viewers, document exporters, image loaders, and log viewers. The feature works like:
```
Read file: /var/app/docs/ + [user input]
```
The intent is that the user picks a filename like `readme.txt`. But if the input is `../../etc/passwd`, the resulting path is:
```
/var/app/docs/../../etc/passwd → /etc/passwd
```
The `../` sequences walk up the directory tree. Without sanitisation, any file the web server can read becomes accessible.