A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
2020-10-28T13:15:13.027
2025-02-12T19:59:29.137
Analyzed
CVSSv3.1: 7.2 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | ivanti | connect_secure | ≤ 9.0 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |
Application | ivanti | connect_secure | 9.1 | Yes |