Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-8218: Public KB - SA44516 - 2020-07: Security Bulletin: Multiple Vulnerabilities Resolved in Pulse Connect Secure

A code injection vulnerability exists in Pulse Connect Secure <9.1R8 that allows an attacker to crafted a URI to perform an arbitrary code execution via the admin web interface.

CVE
#xss#vulnerability#web#google#auth

The solution for these vulnerabilities is to upgrade the Pulse Connect Secure and Pulse Policy Secure server software version to the 9.1R8. This following PCS/PPS version can be downloaded from https://my.pulsesecure.net.

Note: The following vulnerabilities are server-side fixes only. There is no need to upgrade the Pulse Desktop Client to resolve or mitigate the following issues.

CVE

CVSS Score (V3)

Summary

CVE-2020-8206

8.1 High CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Attacker can bypass the Google TOTP, if the primary credentials are exposed to attacker.
NOTE: If PCS TOTP Auth Server is configured as Remote Server, both PCS should need to be upgraded.

CVE-2020-8218

7.2 High CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Authenticated attacker via the admin web interface can crafted URI to perform an arbitrary code execution

CVE-2020-8221

6.8 Medium CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

Authenticated attacker via the administrator web interface can read arbitrary files.

CVE-2020-8222

6.8 Medium CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

Authenticated attacker via the administrator web interface can perform an arbitrary file reading vulnerability through Meeting.

CVE-2020-8219

6.6 Medium CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

A user administrator can change the password of a full Administrator.

CVE-2020-8220

6.5 Medium CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H

Authenticated attacker via the administrator web interface can perform command injection that cause DOS.

CVE-2020-12880

6.2 Medium
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

An insider malicious actor can manipulate kernel boot parameter to gain the root access of VA Appliances

CVE-2019-11507

6.1 Medium CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

DOM-based link manipulation vulnerability found in the PSAL Download Page.

CVE-2020-8204

6.1 Medium CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

A Cross site scripting issue (XSS) has been found in URL used for PSAL Page.

CVE-2018-19519

5.5 Medim
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Authenticated attacker via the administrator web interface can perform a stack-based buffer attack.

CVE-2020-8217

5.5 Medium CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L

A Cross site scripting issue (XSS) has been found in URL used for Citrix ICA.

CVE-2020-8216

3.7 LOW CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

A vulnerability in meeting of Pulse Connect Secure allow an authenticated end-users to find meeting details, if they know the Meeting ID.

CVE-2020-15408

3.7 Low CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

Authenticated attacker via the end user web interface access admin page console through rewrite.

Document History:
July 27, 2020 - Initial advisory posted and software was posted to the Download Center.
July 28, 2020 - Adding information the following issues is not applicable to Pulse Desktop Client.
Jan 7, 2020 - Adding additional information for CVE-2020-8206.

LEGAL DISCLAIMER

  • THIS ADVISORY IS PROVIDED ON AN “AS IS” BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE OF THIS INFORMATION FOUND IN THIS ADVISORY OR IN MATERIALS LINKED HERE FROM IS AT THE USER’S OWN RISK. PULSE SECURE RESERVES THE RIGHT TO CHANGE OR UPDATE THIS ADVISORY AT ANY TIME.
  • A STANDALONE COPY OR PARAPHRASE OF THE TEXT OF THIS ADVISORY THAT OMITS THE DISTRIBUTION URL IS AN UNCONTROLLED COPY AND MAY OMIT IMPORTANT INFORMATION OR CONTAIN ERRORS. THE INFORMATION IN THIS ADVISORY IS INTENDED FOR END USERS OF PULSE SECURE PRODUCTS.

Related news

CVE-2022-34625: CWE-94: Improper Control of Generation of Code ('Code Injection') (4.8)

Mealie1.0.0beta3 was discovered to contain a Server-Side Template Injection vulnerability, which allows attackers to execute arbitrary code via a crafted Jinja2 template.

CVE-2019-11541: Public KB - SA44101 - 2019-04: Out-of-Cycle Advisory: Multiple vulnerabilities resolved in Pulse Connect Secure

In Pulse Secure Pulse Connect Secure version 9.0RX before 9.0R3.4, 8.3RX before 8.3R7.1, and 8.2RX before 8.2R12.1, users using SAML authentication with the Reuse Existing NC (Pulse) Session option may see authentication leaks.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907