A vulnerability has been discovered in login.cgi in Pulse Secure Pulse Connect Secure (PCS) 8.1RX before 8.1R12 and 8.3RX before 8.3R2 and Pulse Policy Secure (PPS) 5.2RX before 5.2R9 and 5.4RX before 5.4R2 wherein an http(s) Host header received from the browser is trusted without validation.
References
Link | Resource |
---|---|
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 | Vendor Advisory |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43877 - Vendor Advisory |
27 Feb 2024, 21:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ivanti:connect_secure:8.1:*:*:*:*:*:*:* | |
First Time |
Ivanti connect Secure
Ivanti |
Information
Published : 2018-09-06 23:29
Updated : 2024-11-21 04:10
NVD link : CVE-2018-6320
Mitre link : CVE-2018-6320
CVE.ORG link : CVE-2018-6320
JSON object : View
Products Affected
pulsesecure
- pulse_connect_secure
- pulse_policy_secure
ivanti
- connect_secure
CWE
CWE-20
Improper Input Validation