Vulnerability CVE-2018-20193


Published: 2018-12-21   Modified: 2018-12-22

Description:
Certain Secure Access SA Series SSL VPN products (originally developed by Juniper Networks but now sold and supported by Pulse Secure, LLC) allow privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000 5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because appropriate controls are not performed. Specifically, it is possible for a readonly user to change the administrator user password by making a local copy of the /dana-admin/user/update.cgi page, changing the "user" value, and saving the changes.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Juniper Secure Access SSL VPN Privilege Escalation
Rafael Pedrero
23.12.2018

Type:

CWE-269

(Improper Privilege Management)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Pulsesecure -> Secure access series ssl vpn sa-4000 

 References:
http://seclists.org/fulldisclosure/2018/Dec/37
http://www.securityfocus.com/bid/106289

Copyright 2024, cxsecurity.com

 

Back to Top