Pulse Connect Secure 8.3R1 has Reflected XSS in launchHelp.cgi. The helpLaunchPage parameter is reflected in an IFRAME element, if the value contains two quotes. It properly sanitizes quotes and tags, so one cannot simply close the src with a quote and inject after that. However, an attacker can use javascript: or data: to abuse this.
References
Link | Resource |
---|---|
https://twitter.com/sxcurity/status/884556905145937921 | Third Party Advisory |
http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf | Third Party Advisory |
http://www.securityfocus.com/bid/99615 |
Configurations
Information
Published : 2017-07-12 13:29
Updated : 2017-07-18 18:29
NVD link : CVE-2017-11195
Mitre link : CVE-2017-11195
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
pulsesecure
- pulse_connect_secure