SynopsisThe remote web application server is affected by a path traversal vulnerability.
DescriptionThe instance of Pulse Secure (formerly Juniper Networks JunOS Pulse) Pulse Connect Secure SSL VPN running on the remote host is affected by a path traversal vulnerability. A remote, unauthenticated attacker can exploit this issue, via a specially crafted HTTP request, to access arbitrary files on the remote host.
This can allow an attacker to obtain an authenticated HTTP session with the SSL VPN web application. The attacker could then leverage CVE-2019-11539, an authenticated command injecton vulnerability, to execute arbitrary commands on the SSL VPN.
SolutionUpgrade to a patched version according to the vendor advisory.