Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":833,"date":"2023-08-10T17:02:31","date_gmt":"2023-08-10T17:02:31","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/"},"modified":"2023-08-10T17:02:31","modified_gmt":"2023-08-10T17:02:31","slug":"security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/","title":{"rendered":"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar"},"content":{"rendered":"

Introduction<\/p>\n

On 18 July 2023, Citrix published a security advisory that addressed a critical vulnerability with CVSS score 9.8 for CVE-2023-3519 for RCE (Remote Code Execution) in NetScaler ADC (formerly known as Citrix ADC) and NetScaler Gateway (formerly known as Citrix Gateway). <\/p>\n

This vulnerability created a lot of buzz in the last several days. Many reports claim that the vulnerability was being exploited as a zero-day attack in the wild as threat actors were dropping a web shell onto organization’s critical infrastructure.<\/p>\n

The advisory from Citrix also includes additional vulnerabilities affecting NetScaler users.<\/p>\n

\tCVE-2023-3466 – A reflected Cross-Site Scripting (XSS) vulnerability which requires the victim to access an attacker-controlled link in the browser while being on a network with connectivity to the NSIP. NetScaler IP (NSIP) address is the IP address where you access the NetScaler for management purposes.
\n\tCVE-2023-3467 – A Privilege Escalation vulnerability that requires authenticated access to NSIP or SNIP with management interface access. A subnet IP address (SNIP) is a NetScaler owned IP address that is used by NetScaler to communicate with the servers.<\/p>\n

Key Takeaways <\/p>\n

\tNew Vulnerability Discovered: A new vulnerability, CVE-2023-3519, has been discovered that impacts NetScaler ADC NetScaler Gateway applications.
\n\tUpgrade Your Application: If you see your ADC or Gateway version below, Zscaler strongly urges you to upgrade to a safe version.<\/p>\n

\t\tNetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.13
\n\t\tNetScaler ADC and NetScaler Gateway 13.0 before 13.0-91.13
\n\t\tNetScaler ADC 13.1-FIPS before 13.1-37.159
\n\t\tNetScaler ADC 12.1-FIPS before 12.1-55.297
\n\t\tNetScaler ADC 12.1-NDcPP before 12.1-55.297<\/p>\n

Possible Execution\/PoC<\/p>\n

CVE-2023-3519 could allow an unauthenticated threat actor to trigger a stack buffer overflow in the NetScaler Packet Processing Engine (nsppe) process by sending a specially crafted HTTP GET request. Since the nsppe runs as root, successful exploitation would likely result in arbitrary code execution as the ‘root’.<\/p>\n

This is an example of the HTTP request with GET method:<\/p>\n

Figure 1: Example Packet Capture with shell code<\/p>\n

A proof-of-concept (PoC) for CVE-2023-3519 in Citrix ADC can be found on GitHub.<\/p>\n

Attack Chain<\/p>\n

A threat actor can exploit CVE-2023-3519 by uploading files containing malicious web shells and scripts, allowing them to scan networks and extract sensitive information. <\/p>\n

A server’s configuration files contain encrypted passwords that can be viewed and decrypted by decryption keys that are available on the same server. Thus, making configuration files an obvious target for threat actors. By decrypting Active Directory credentials, a threat actor can retrieve a wide range of information, including:<\/p>\n

\tdetails about users
\n\tcomputers
\n\tgroups
\n\tsubnets
\n\torganizational units<\/p>\n

Figure 2: Attack chain of Citrix Gateway CVE-2023-3519 unauthenticated remote code execution<\/p>\n

1. Initial Access – According to CISA, a threat actor can upload a TGZ File (a compressed archive created using GZIP) containing a generic web shell, discovery script, and setuid binary file on the Citrix’s NetScaler Application Delivery Controller (ADC) application. Through the web shell, the threat actor can execute remote commands on the compromised system, establishing a reliable command and control channel.<\/p>\n

2. Privilege Escalation – The uploaded TGZ file consists of a setuid binary file which is used by threat actors to exploit Elevation Control Mechanism and gain elevated permissions on a system.<\/p>\n

3. Credential Access – A threat actor uses the NetScaler configuration files, located in \/flash\/nsconfig\/keys\/updated\/* and \/nsconfig\/ns.conf, to find an encrypted password that can be decrypted by the key stored on the ADC application. Using these keys, the Active Directory credentials are decrypted from the configuration file.<\/p>\n

4. Discovery – The threat actor uses the newly acquired, decrypted credentials to query the Active Directory for trusted domains, organization units (OU), computers, users, etc. within the network that can be exploited to move laterally or escalate privileges. <\/p>\n

5. Collection – The threat actor uses the ‘tarball’ command to compress the collected data and uses ‘openssl’ to encrypt the data. The following command is used by the threat actor to collect the compromised data from the infected system: <\/p>\n

tar -czvf – \/var\/tmp\/all.txt openssl des3 -salt -k &lt;&gt; -out \/var\/tmp\/test.tar.gz<\/p>\n

6. Defense Evasion – Exfiltrated, collected data can be uploaded as an image file to a web accessible path to bypass detection engines using this command: <\/p>\n

cp \/var\/tmp\/test.tar.gz \/netscaler\/ns_gui\/vpn\/medialogininit.png.<\/p>\n

As per public reports, a segmented environment where ADC applications were deployed prevented the threat actors from discovering critical infrastructure. The threat actors attempted to:<\/p>\n

\tExecute a subnet-wide curl command to identify what was accessible from within the network as well as potential lateral movement targets.
\n\tVerify outbound network connectivity with a ping command (ping -c 1 google.com).
\n\tExecute host commands for a subnet-wide DNS lookup.<\/p>\n

Like the reports state, the threat actors also attempted to delete their artifacts. They deleted the authorization configuration file (\/etc\/auth.conf) to prevent configured users (e.g., admin) from logging in remotely (e.g., CLI). Normally, an organization would need to reboot into single user mode (which may have deleted artifacts from the device) to regain access to the ADC application. However, in this case, the victim used an a readily available SSH key to gain access into the appliance without rebooting.<\/p>\n

The threat actor’s post-exploitation lateral movement attempts were also blocked by network-segmentation controls. The threat actors implanted a second web shell on the victim that they later removed. This was likely a PHP shell with proxying capability. The threat actors likely used this to attempt proxying SMB traffic to the DC (the victim observed SMB connections where the actors attempted to use the previously decrypted AD credential to authenticate with the DC from the ADC via a virtual machine). Firewall and account restrictions (only certain internal accounts could authenticate to the DC) blocked this activity.<\/p>\n

Figure 3: Metasploit releases the exploit for CVE-2023-3519<\/p>\n

Affected products<\/p>\n

The following supported versions of NetScaler ADC and NetScaler Gateway are affected by the vulnerabilities: <\/p>\n

\tNetScaler ADC and NetScaler Gateway 13.1 before 13.1-49.13
\n\tNetScaler ADC and NetScaler Gateway 13.0 before 13.0-91.13
\n\tNetScaler ADC 13.1-FIPS before 13.1-37.159
\n\tNetScaler ADC 12.1-FIPS before 12.1-55.297
\n\tNetScaler ADC 12.1-NDcPP before 12.1-55.297<\/p>\n

Mitigations<\/p>\n

Zscaler has observed exploits of CVE-2023-3519 on unmitigated applications. Zscaler strongly urges affected customers of NetScaler ADC and NetScaler Gateway to install the relevant updated versions as soon as possible. <\/p>\n

\tNetScaler ADC and NetScaler Gateway 13.1-49.13 and later releases
\n\tNetScaler ADC and NetScaler Gateway 13.0-91.13 and later releases of 13.0
\n\tNetScaler ADC 13.1-FIPS 13.1-37.159 and later releases of 13.1-FIPS
\n\tNetScaler ADC 12.1-FIPS 12.1-55.297 and later releases of 12.1-FIPS
\n\tNetScaler ADC 12.1-NDcPP 12.1-55.297 and later releases of 12.1-NDcPP <\/p>\n

Zscaler Coverage<\/p>\n

Zscaler’s ThreatLabZ team has deployed protection.<\/p>\n

\tZscaler Advanced Threat Protection:<\/p>\n

\t\tApp.Exploit.CVE-2023-3519<\/p>\n

\tZscaler Private Access Protection:<\/p>\n

\t\tRemote Code Execution : 932100 (Remote Command Execution: Unix Command Injection basic coverage)
\n\t\tRemote Code Execution : 932200 (RCE Bypass Technique)
\n\t\tPHP Injection : 933100 (PHP Injection Attack: PHP Open Tag Found)<\/p>\n

We will update this article as information becomes available or if additional protection is put in place by Zscaler. <\/p>\n

Resources<\/p>\n

\tCitrix ADC and Citrix Gateway Security Bulletin for CVE-2023-3519, CVE-2023-3466, CVE-2023-346
\n\tThreat Actors Exploiting Citrix CVE-2023-3519 to Implant Webshells <\/p>","protected":false},"excerpt":{"rendered":"

Introduction On 18 July 2023, Citrix published a security advisory […]<\/p>\n","protected":false},"author":0,"featured_media":807,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zenith-zscaler"],"yoast_head":"\nSecurity Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar\" \/>\n<meta property=\"og:description\" content=\"Introduction On 18 July 2023, Citrix published a security advisory […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-10T17:02:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"424\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar\",\"datePublished\":\"2023-08-10T17:02:31+00:00\",\"dateModified\":\"2023-08-10T17:02:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/\"},\"wordCount\":1187,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg\",\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/\",\"name\":\"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg\",\"datePublished\":\"2023-08-10T17:02:31+00:00\",\"dateModified\":\"2023-08-10T17:02:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg\",\"width\":1080,\"height\":424},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/","og_locale":"en_US","og_type":"article","og_title":"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar","og_description":"Introduction On 18 July 2023, Citrix published a security advisory […]","og_url":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/","og_site_name":"JHC","article_published_time":"2023-08-10T17:02:31+00:00","og_image":[{"width":1080,"height":424,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/"},"author":{"name":"","@id":""},"headline":"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar","datePublished":"2023-08-10T17:02:31+00:00","dateModified":"2023-08-10T17:02:31+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/"},"wordCount":1187,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg","articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/","url":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/","name":"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg","datePublished":"2023-08-10T17:02:31+00:00","dateModified":"2023-08-10T17:02:31+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/08\/zscaler-blog-cloud-security-2402x-1O0bn9.jpeg","width":1080,"height":424},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/security-advisory-remote-code-execution-vulnerability-cve-2023-3519-vishal-sangolekar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Security Advisory: Remote Code Execution Vulnerability (CVE-2023-3519) Vishal Sangolekar"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=833"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/833\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/807"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}