In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108073 | Broken Link Third Party Advisory VDB Entry |
https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ | Exploit Third Party Advisory |
https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf | Exploit Third Party Advisory |
https://kb.pulsesecure.net/?atype=sa | Third Party Advisory Vendor Advisory |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/ | Patch Vendor Advisory |
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010 | Third Party Advisory |
https://www.kb.cert.org/vuls/id/927237 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-05-08 17:29
Updated : 2024-02-27 21:04
NVD link : CVE-2019-11508
Mitre link : CVE-2019-11508
CVE.ORG link : CVE-2019-11508
JSON object : View
Products Affected
ivanti
- connect_secure
pulsesecure
- pulse_connect_secure
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')