In Pulse Secure Pulse Connect Secure (PCS) 8.3.x before 8.3R7.1 and 9.0.x before 9.0R3, an XSS issue has been found on the Application Launcher page.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108073 | Broken Link Third Party Advisory VDB Entry |
https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ | Exploit Third Party Advisory |
https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf | Exploit Third Party Advisory |
https://kb.pulsesecure.net/?atype=sa | Third Party Advisory Vendor Advisory |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/ | Patch Vendor Advisory |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 | Third Party Advisory |
https://www.kb.cert.org/vuls/id/927237 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
History
27 Feb 2024, 21:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r2.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r1.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5.2:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r4:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r3:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r6.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r6:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r7:*:*:*:*:*:* |
cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r1.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:* |
24 Mar 2023, 17:49
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://kb.pulsesecure.net/?atype=sa - Third Party Advisory, Vendor Advisory | |
References | (MISC) https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ - Exploit, Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/108073 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CERT-VN) https://www.kb.cert.org/vuls/id/927237 - Third Party Advisory, US Government Resource | |
References | (MISC) https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf - Exploit, Third Party Advisory | |
References | (CONFIRM) https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44516 - Third Party Advisory |
Information
Published : 2019-05-08 17:29
Updated : 2024-02-27 21:04
NVD link : CVE-2019-11507
Mitre link : CVE-2019-11507
CVE.ORG link : CVE-2019-11507
JSON object : View
Products Affected
ivanti
- connect_secure
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')