Vulnerabilities > CVE-2019-11541
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
NONE Availability impact
NONE Summary
In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, and 8.2RX before 8.2R12.1, users using SAML authentication with the Reuse Existing NC (Pulse) Session option may see authentication leaks.
Vulnerable Configurations
Nessus
NASL family | Misc. |
NASL id | PULSE_CONNECT_SECURE-SA-44101.NASL |
description | According to its self-reported version, the version of Pulse Connect Secure running on the remote host is affected by multiple vulnerabilities. - An arbitrary file read vulnerability exists in PCS. An unauthenticated, remote attacker can exploit this, via specially crafted URI, to read arbitrary files and disclose sensitive information. (CVE-2019-11510) - Multiple vulnerabilities are found in Ghostscript.(CVE-2018-16513 , CVE-2018-18284, CVE-2018-15911, CVE-2018-15910, CVE-2018-15909) - A session hijacking vulnerability exists in PCS. An unauthenticated, remote attacker can exploit this, to perform actions in the user or administrator interface with the privileges of another user. (CVE-2019-11540) - An authentication leaks seen in users using SAML authentication with the reuse existing NC (Pulse) session option. (CVE-2019-11541) - Multiple vulnerabilities found in the admin web interface of PCS. (CVE-2019-11543, CVE-2019-11542, CVE-2019-11509, CVE-2019-11539) - Multiple vulnerabilities found in Network File Share (NFS) of PCS , allows the attacker to read/write arbitrary files on the affected device. (CVE-2019-11538, CVE-2019-11508) - A cross-site scripting (XSS) vulnerability exists in application launcher page due to improper validation of user-supplied input before returning it to users. An attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 124766 |
published | 2019-05-10 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/124766 |
title | Pulse Connect Secure Multiple Vulnerabilities (SA44101) |
References
- http://www.securityfocus.com/bid/108073
- http://www.securityfocus.com/bid/108073
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/
- https://www.kb.cert.org/vuls/id/927237
- https://www.kb.cert.org/vuls/id/927237