Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-03T02:53:36.293Z
Reserved: 2021-12-10T00:00:00
Link: CVE-2022-21826
No data.
Status : Modified
Published: 2022-09-30T17:15:12.183
Modified: 2024-11-21T06:45:30.770
Link: CVE-2022-21826
No data.
OpenCVE Enrichment
No data.
Weaknesses