In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
References
Configurations
Configuration 1 (hide)
|
History
25 Jul 2024, 16:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/ - Broken Link, Third Party Advisory | |
References | () https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ - Exploit, Third Party Advisory | |
References | () https://kb.pulsesecure.net/?atype=sa - Not Applicable, Vendor Advisory | |
References | () https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/ - Broken Link, Patch, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3E - Mailing List |
27 Feb 2024, 21:04
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r1.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r4.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r4:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r5.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r8.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r8.2:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r3.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r11.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r12.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r9.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r1.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r4.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r6.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r2.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r10.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r7.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5.2:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r3:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r5:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r8.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r5.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r6.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r3.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r7.1:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r2.0:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r6:*:*:*:*:*:* cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3:r7:*:*:*:*:*:* |
cpe:2.3:a:ivanti:connect_secure:8.3:r4:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r2.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r5:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r8.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r8.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r6:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r3:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r5.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r5.2:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r6.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r9.0:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.2:r8.1:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:8.3:r7:*:*:*:*:*:* |
24 Mar 2023, 17:36
Type | Values Removed | Values Added |
---|---|---|
References | (CERT-VN) https://www.kb.cert.org/vuls/id/927237 - Third Party Advisory, US Government Resource | |
References | (BID) http://www.securityfocus.com/bid/108073 - Broken Link, Third Party Advisory, VDB Entry |
Information
Published : 2019-05-08 17:29
Updated : 2024-07-25 16:20
NVD link : CVE-2019-11510
Mitre link : CVE-2019-11510
CVE.ORG link : CVE-2019-11510
JSON object : View
Products Affected
ivanti
- connect_secure
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')