A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 | vendor advisory broken link |
http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html | third party advisory vdb entry exploit |