CVE-2022-21826

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
HTTP Request/Response Smuggling
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.4 MEDIUM
NETWORK
LOW
LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
ivanticonnect_secure
9.1
ivanticonnect_secure
9.1:r1
ivanticonnect_secure
9.1:r1.0
ivanticonnect_secure
9.1:r10.0
ivanticonnect_secure
9.1:r10.2
ivanticonnect_secure
9.1:r11.0
ivanticonnect_secure
9.1:r11.1
ivanticonnect_secure
9.1:r11.3
ivanticonnect_secure
9.1:r11.4
ivanticonnect_secure
9.1:r12
ivanticonnect_secure
9.1:r12.1
ivanticonnect_secure
9.1:r12.2
ivanticonnect_secure
9.1:r13
ivanticonnect_secure
9.1:r15
ivanticonnect_secure
9.1:r2
ivanticonnect_secure
9.1:r2.0
ivanticonnect_secure
9.1:r3
ivanticonnect_secure
9.1:r3.0
ivanticonnect_secure
9.1:r4
ivanticonnect_secure
9.1:r4.0
ivanticonnect_secure
9.1:r4.1
ivanticonnect_secure
9.1:r4.2
ivanticonnect_secure
9.1:r4.3
ivanticonnect_secure
9.1:r5
ivanticonnect_secure
9.1:r5.0
ivanticonnect_secure
9.1:r6
ivanticonnect_secure
9.1:r6.0
ivanticonnect_secure
9.1:r7
ivanticonnect_secure
9.1:r7.0
ivanticonnect_secure
9.1:r8
ivanticonnect_secure
9.1:r8.0
ivanticonnect_secure
9.1:r8.1
ivanticonnect_secure
9.1:r8.2
ivanticonnect_secure
9.1:r8.4
ivanticonnect_secure
9.1:r9
ivanticonnect_secure
9.1:r9.0
ivanticonnect_secure
9.1:r9.1
ivanticonnect_secure
9.1:r9.2
pulsesecurepulse_connect_secure
𝑥
< 9.1
𝑥
= Vulnerable software versions