Pulse Connect Secure 8.3R1 has Reflected XSS in adminservercacertdetails.cgi. In the admin panel, the certid parameter of adminservercacertdetails.cgi is reflected in the application's response and is not properly sanitized, allowing an attacker to inject tags. An attacker could come up with clever payloads to make the system run commands such as ping, ping6, traceroute, nslookup, arp, etc.
References
Link | Resource |
---|---|
http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf | Third Party Advisory |
https://twitter.com/sxcurity/status/884556905145937921 | Third Party Advisory |
http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf | Third Party Advisory |
https://twitter.com/sxcurity/status/884556905145937921 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf - Third Party Advisory | |
References | () https://twitter.com/sxcurity/status/884556905145937921 - Third Party Advisory |
Information
Published : 2017-07-12 20:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11194
Mitre link : CVE-2017-11194
CVE.ORG link : CVE-2017-11194
JSON object : View
Products Affected
pulsesecure
- pulse_connect_secure
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')