CVE-2019-11538

In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, 8.2RX before 8.2R12.1, and 8.1RX before 8.1R15.1, an NFS problem could allow an authenticated attacker to access the contents of arbitrary files on the affected device.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r3.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r7.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/108073 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108073 - Third Party Advisory, VDB Entry
References () https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ - Exploit, Third Party Advisory () https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ - Exploit, Third Party Advisory
References () https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf - Exploit, Third Party Advisory () https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf - Exploit, Third Party Advisory
References () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101 - Vendor Advisory () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101 - Vendor Advisory
References () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010 - Third Party Advisory () https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010 - Third Party Advisory
References () https://www.kb.cert.org/vuls/id/927237 - Third Party Advisory, US Government Resource () https://www.kb.cert.org/vuls/id/927237 - Third Party Advisory, US Government Resource

27 Feb 2024, 21:04

Type Values Removed Values Added
CPE cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r1.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r11.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r1.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r6:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r2.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r12.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r8.2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r3.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5.2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r14.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r2.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r9.2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r7.2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r4.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r13.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r4.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r12.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r9.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r3.2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r3.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r6.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r3.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r7.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r9.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r1.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r8.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r10.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r4.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r2.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r7.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r12.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r3.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r4.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r6.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r5.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r11.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r1.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r5.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r8.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r6.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r5.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r8.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r10.0:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r7.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r11.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r2.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.1:r9.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r3:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r4:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r4.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r2.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r7.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r11.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r3.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r10.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r9.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r6.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r9.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r2.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r5.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r12.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r8.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r4.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r11.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r12.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r9.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r1.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r3.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r1.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r3.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r13.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r7.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.1:r14.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:*

13 Jan 2024, 18:36

Type Values Removed Values Added
First Time Ivanti connect Secure
Ivanti
CPE cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0:r3.2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0:r2:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0:r3.1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0:r3:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0:r1:*:*:*:*:*:*
cpe:2.3:a:pulsesecure:pulse_connect_secure:9.0:r2.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r3.2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r2.1:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r3:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r2:*:*:*:*:*:*
cpe:2.3:a:ivanti:connect_secure:9.0:r3.1:*:*:*:*:*:*

Information

Published : 2019-04-26 02:29

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11538

Mitre link : CVE-2019-11538

CVE.ORG link : CVE-2019-11538


JSON object : View

Products Affected

ivanti

  • connect_secure
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')