CVE-2022-21826
30.09.2022, 17:15
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
Vendor | Product | Version |
---|---|---|
ivanti | connect_secure | 9.1 |
ivanti | connect_secure | 9.1:r1 |
ivanti | connect_secure | 9.1:r1.0 |
ivanti | connect_secure | 9.1:r10.0 |
ivanti | connect_secure | 9.1:r10.2 |
ivanti | connect_secure | 9.1:r11.0 |
ivanti | connect_secure | 9.1:r11.1 |
ivanti | connect_secure | 9.1:r11.3 |
ivanti | connect_secure | 9.1:r11.4 |
ivanti | connect_secure | 9.1:r12 |
ivanti | connect_secure | 9.1:r12.1 |
ivanti | connect_secure | 9.1:r12.2 |
ivanti | connect_secure | 9.1:r13 |
ivanti | connect_secure | 9.1:r15 |
ivanti | connect_secure | 9.1:r2 |
ivanti | connect_secure | 9.1:r2.0 |
ivanti | connect_secure | 9.1:r3 |
ivanti | connect_secure | 9.1:r3.0 |
ivanti | connect_secure | 9.1:r4 |
ivanti | connect_secure | 9.1:r4.0 |
ivanti | connect_secure | 9.1:r4.1 |
ivanti | connect_secure | 9.1:r4.2 |
ivanti | connect_secure | 9.1:r4.3 |
ivanti | connect_secure | 9.1:r5 |
ivanti | connect_secure | 9.1:r5.0 |
ivanti | connect_secure | 9.1:r6 |
ivanti | connect_secure | 9.1:r6.0 |
ivanti | connect_secure | 9.1:r7 |
ivanti | connect_secure | 9.1:r7.0 |
ivanti | connect_secure | 9.1:r8 |
ivanti | connect_secure | 9.1:r8.0 |
ivanti | connect_secure | 9.1:r8.1 |
ivanti | connect_secure | 9.1:r8.2 |
ivanti | connect_secure | 9.1:r8.4 |
ivanti | connect_secure | 9.1:r9 |
ivanti | connect_secure | 9.1:r9.0 |
ivanti | connect_secure | 9.1:r9.1 |
ivanti | connect_secure | 9.1:r9.2 |
pulsesecure | pulse_connect_secure | 𝑥 < 9.1 |
𝑥
= Vulnerable software versions