Description
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-03T02:53:36.293Z
Reserved: 2021-12-10T00:00:00.000Z
Link: CVE-2022-21826
No data.
Status : Modified
Published: 2022-09-30T17:15:12.183
Modified: 2024-11-21T06:45:30.770
Link: CVE-2022-21826
No data.
OpenCVE Enrichment
No data.
Weaknesses