Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w594-hmpv-qhh5

Опубликовано: 01 окт. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.

EPSS

Процентиль: 92%
0.08842
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 5.4
nvd
больше 3 лет назад

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.

EPSS

Процентиль: 92%
0.08842
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-444