Pulse Connect Secure 8.3R1 has Reflected XSS in launchHelp.cgi. The helpLaunchPage parameter is reflected in an IFRAME element, if the value contains two quotes. It properly sanitizes quotes and tags, so one cannot simply close the src with a quote and inject after that. However, an attacker can use javascript: or data: to abuse this.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99615 | |
http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf | Third Party Advisory |
https://twitter.com/sxcurity/status/884556905145937921 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-07-12 20:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-11195
Mitre link : CVE-2017-11195
CVE.ORG link : CVE-2017-11195
JSON object : View
Products Affected
pulsesecure
- pulse_connect_secure
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')