111 lines
3.6 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2017-11194",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-07-12T20:29:00.317",
"lastModified": "2017-07-17T17:18:28.903",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Pulse Connect Secure 8.3R1 has Reflected XSS in adminservercacertdetails.cgi. In the admin panel, the certid parameter of adminservercacertdetails.cgi is reflected in the application's response and is not properly sanitized, allowing an attacker to inject tags. An attacker could come up with clever payloads to make the system run commands such as ping, ping6, traceroute, nslookup, arp, etc."
},
{
"lang": "es",
"value": "En Pulse Connect Secure versi\u00f3n 8.3R1, presenta un problema de tipo XSS reflejado en el archivo adminservercacertdetails.cgi. En el panel de administraci\u00f3n, el par\u00e1metro certid del archivo adminservercacertdetails.cgi es reflejado en la respuesta de la aplicaci\u00f3n y no est\u00e1 saneado apropiadamente, permitiendo que un atacante inyecte etiquetas. Un atacante podr\u00eda venir con una carga \u00fatil inteligente para hacer que el sistema ejecute comandos como ping, ping6, traceroute, nslookup, arp, etc."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3r1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "03CC2CCF-AF71-4DB5-98D1-C82C4DD8E7C8"
}
]
}
]
}
],
"references": [
{
"url": "http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://twitter.com/sxcurity/status/884556905145937921",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}