Rapid7 Vulnerability & Exploit Database

Pulse Secure Pulse Connect Secure: CVE-2017-11195: Pulse Connect Secure (PCS) / Pulse Policy Secure (PPS) Cross Site Scripting Issue (SA40771)

Back to Search

Pulse Secure Pulse Connect Secure: CVE-2017-11195: Pulse Connect Secure (PCS) / Pulse Policy Secure (PPS) Cross Site Scripting Issue (SA40771)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
07/12/2017
Created
10/28/2020
Added
10/28/2020
Modified
10/28/2020

Description

Pulse Connect Secure 8.3R1 has Reflected XSS in launchHelp.cgi. The helpLaunchPage parameter is reflected in an IFRAME element, if the value contains two quotes. It properly sanitizes quotes and tags, so one cannot simply close the src with a quote and inject after that. However, an attacker can use javascript: or data: to abuse this.

Solution(s)

  • pulse-secure-pulse-connect-secure-upgrade-8_0r17_0
  • pulse-secure-pulse-connect-secure-upgrade-8_1r12_1
  • pulse-secure-pulse-connect-secure-upgrade-8_2r8_2
  • pulse-secure-pulse-connect-secure-upgrade-8_3r2_1

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;