Pulse Connect Secure tcpdump options Command Injection

Strike ID:
E19-7nxv1
CVSS:
7.2 CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2019

Description

A command injection vulnerability exists in Pulse Connect Secure due to insufficient parameter sanitization. The vulnerability resides in the '/dana-admin/diag/diag.cgi' endpoint and can be exploited by crafting the 'options' parameter in order to create a template file which contains Perl directives. By exploiting the flaw, a remote authenticated attacker may execute arbitrary commands on the target system.

CVE

References

Bid