CVE-2019-11508

high

Description

In Pulse Secure Pulse Connect Secure (PCS) before 8.1R15.1, 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an authenticated attacker (via the admin web interface) can exploit Directory Traversal to execute arbitrary code on the appliance.

References

https://www.tenable.com/cyber-exposure/2020-threat-landscape-retrospective

https://www.tenable.com/blog/cve-2018-13379-cve-2019-11510-fortigate-and-pulse-connect-secure-vulnerabilities-exploited-in

https://www.kb.cert.org/vuls/id/927237

https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010

https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/

https://kb.pulsesecure.net/?atype=sa

Details

Source: Mitre, NVD

Published: 2019-05-08

Updated: 2024-02-27

Risk Information

CVSS v2

Base Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Severity: High