CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
22.7%
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request’s Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
Vendor | Product | Version | CPE |
---|---|---|---|
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r1.0:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:* |
ivanti | connect_secure | 9.1 | cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:* |