Vulnerability Description
Pulse Connect Secure 8.3R1 has CSRF in logout.cgi. The logout function of the admin panel is not protected by any CSRF tokens, thus allowing an attacker to logout a user by making them visit a malicious web page.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pulsesecure | Pulse Connect Secure | 8.3r1.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/99613
- http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20SecThird Party Advisory
- https://twitter.com/sxcurity/status/884556905145937921Third Party Advisory
- http://www.securityfocus.com/bid/99613
- http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20SecThird Party Advisory
- https://twitter.com/sxcurity/status/884556905145937921Third Party Advisory
FAQ
What is CVE-2017-11196?
CVE-2017-11196 is a vulnerability with a CVSS score of 8.8 (HIGH). Pulse Connect Secure 8.3R1 has CSRF in logout.cgi. The logout function of the admin panel is not protected by any CSRF tokens, thus allowing an attacker to logout a user by making them visit a malicio...
How severe is CVE-2017-11196?
CVE-2017-11196 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-11196?
Check the references section above for vendor advisories and patch information. Affected products include: Pulsesecure Pulse Connect Secure.