Pulse Connect Secure 8.3R1 has Reflected XSS in launchHelp.cgi. The helpLaunchPage parameter is reflected in an IFRAME element, if the value contains two quotes. It properly sanitizes quotes and tags, so one cannot simply close the src with a quote and inject after that. However, an attacker can use javascript: or data: to abuse this.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/99615 | |
http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf | Third Party Advisory |
https://twitter.com/sxcurity/status/884556905145937921 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-07-12T20:00:00
Updated: 2017-07-18T09:57:01
Reserved: 2017-07-12T00:00:00
Link: CVE-2017-11195
JSON object: View
NVD Information
Status : Modified
Published: 2017-07-12T20:29:00.347
Modified: 2017-07-19T01:29:02.393
Link: CVE-2017-11195
JSON object: View
Redhat Information
No data.
CWE