cve/2015/CVE-2015-7323.md

20 lines
936 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-7323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7323)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 allows remote authenticated users to bypass intended access restrictions and log into arbitrary meetings by leveraging a meeting id and meetingAppSun.jar.
### POC
#### Reference
- http://seclists.org/fulldisclosure/2015/Sep/98
- https://packetstormsecurity.com/files/133711/Junos-Pulse-Secure-Meeting-8.0.5-Access-Bypass.html
- https://profundis-labs.com/advisories/CVE-2015-7323.txt
#### Github
No PoCs found on GitHub currently.