Pulse Connect Secure Cross-Site Request Forgery (SA40793)

high Nessus Plugin ID 103052

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the version of Pluse Connect Secure running on the remote host is affected by a cross-site request forgery vulnerability in diag.cgi. This vulnerability may allow remote attackers to hijack the authentication of administrators for requests to start tcpdump.

Solution

Upgrade to or later.

See Also

http://www.nessus.org/u?c8352c00

Plugin Details

Severity: High

ID: 103052

File Name: junos_pulse_sa_40793.nasl

Version: 1.3

Type: local

Family: Misc.

Published: 9/8/2017

Updated: 11/12/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2017-11455

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:juniper:ive_os, cpe:/a:juniper:junos_pulse_secure_access_service, cpe:/a:juniper:junos_pulse_access_control_service

Required KB Items: Host/Juniper/IVE OS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/29/2017

Vulnerability Publication Date: 8/29/2017

Reference Information

CVE: CVE-2017-11455

BID: 100530