CVE-2022-21826HTTP Request Smuggling in Pulse Connect Secure

Severity
5.4MEDIUMNVD
EPSS
5.9%
top 9.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 30
Latest updateOct 1

Description

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-w594-hmpv-qhh5: Pulse Secure version 92022-10-01
CVEList
CVE-2022-21826: Pulse Secure version 92022-09-30
CVE-2022-21826 — HTTP Request Smuggling | cvebase