Vigil@nce - Pulse Secure Virtual Traffic Manager: Cross Site Scripting
February 2019 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer/Computer-vulnerability-database-and-alert
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting of Pulse Secure
Virtual Traffic Manager, in order to run JavaScript code in the
context of the web site.
Impacted products: Pulse Secure VTM.
Severity: 2/4.
Consequences: client access/rights.
Provenance: document.
Confidence: confirmed by the editor (5/5).
Creation date: 27/12/2018.
DESCRIPTION OF THE VULNERABILITY
The Pulse Secure Virtual Traffic Manager product offers a web
service.
However, it does not filter received data before inserting them in
generated HTML documents.
An attacker can therefore trigger a Cross Site Scripting of Pulse
Secure Virtual Traffic Manager, in order to run JavaScript code in
the context of the web site.
ACCESS TO THE FULL VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Pulse-Secure-Virtual-Traffic-Manager-Cross-Site-Scripting-28115