Pulse Policy Secure Cross-Site Request Forgery (SA40793)

high Nessus Plugin ID 103053

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the version of Pluse Policy Secure running on the remote host is affected by a cross-site request forgery vulnerability in diag.cgi. This vulnerability may allow remote attackers to hijack the authentication of administrators for requests to start tcpdump.

Solution

Upgrade to or later.

See Also

http://www.nessus.org/u?c8352c00

Plugin Details

Severity: High

ID: 103053

File Name: pulse_policy_secure-sa-40793.nasl

Version: 1.4

Type: local

Family: Misc.

Published: 9/8/2017

Updated: 6/23/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2017-11455

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:pulsesecure:pulse_policy_secure

Required KB Items: installed_sw/Pulse Policy Secure

Exploit Ease: No known exploits are available

Patch Publication Date: 8/29/2017

Vulnerability Publication Date: 8/29/2017

Reference Information

CVE: CVE-2017-11455

BID: 100530