CVE-2019-11510
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
08/05/2019
Last modified:
03/04/2025
Description
In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability .
Impact
Base Score 3.x
10.00
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:ivanti:connect_secure:8.2:r1.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r1.1:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r10.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r11.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r12.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r2.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r3.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r3.1:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r4.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r4.1:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r5.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r5.1:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r6.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r7.0:*:*:*:*:*:* | ||
cpe:2.3:a:ivanti:connect_secure:8.2:r7.1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html
- http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html
- http://www.securityfocus.com/bid/108073
- https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/
- https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/
- https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf
- https://kb.pulsesecure.net/?atype=sa
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/
- https://lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3E
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010
- https://www.kb.cert.org/vuls/id/927237
- http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html
- http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html
- http://www.securityfocus.com/bid/108073
- https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/
- https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/
- https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf
- https://kb.pulsesecure.net/?atype=sa
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/
- https://lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3E
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010
- https://www.kb.cert.org/vuls/id/927237