| Title | Pulse Connect Secure の diag.cgi におけるクロスサイトリクエストフォージェリの脆弱性 |
|---|---|
| Summary | Pulse Connect Secure の diag.cgi には、クロスサイトリクエストフォージェリの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date | July 10, 2017, midnight |
| Registration Date | Aug. 1, 2017, 4:57 p.m. |
| Last Update | Aug. 1, 2017, 4:57 p.m. |
| CVSS3.0 : 重要 | |
| Score | 8.8 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
| CVSS2.0 : 警告 | |
| Score | 6.8 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:P/I:P/A:P |
| パルスセキュア |
| Pulse Connect Secure 8.3R1 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2017年08月01日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | Pulse Connect Secure 8.3R1 has CSRF in diag.cgi. In the panel, the diag.cgi file is responsible for running commands such as ping, ping6, traceroute, traceroute6, nslookup, arp, and Portprobe. These functions do not have any protections against CSRF. That can allow an attacker to run these commands against any IP if they can get an admin to visit their malicious CSRF page. |
|---|---|
| Publication Date | July 13, 2017, 5:29 a.m. |
| Registration Date | Jan. 26, 2021, 1:12 p.m. |
| Last Update | Nov. 21, 2024, 12:07 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:pulsesecure:pulse_connect_secure:8.3r1.0:*:*:*:*:*:*:* | |||||