A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to upload custom template to perform an arbitrary code execution.
References
Link | Resource |
---|---|
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588 | Vendor Advisory |
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
12 Feb 2025, 19:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:* |
cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:* cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:* |
Information
Published : 2020-09-30 18:15
Updated : 2025-02-12 19:56
NVD link : CVE-2020-8243
Mitre link : CVE-2020-8243
CVE.ORG link : CVE-2020-8243
JSON object : View
Products Affected
ivanti
- connect_secure
- policy_secure
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')