Pulse Secure version 9.115 and below may be susceptible...
Moderate severity
Unreviewed
Published
Oct 1, 2022
to the GitHub Advisory Database
•
Updated Mar 7, 2024
Description
Published by the National Vulnerability Database
Sep 30, 2022
Published to the GitHub Advisory Database
Oct 1, 2022
Last updated
Mar 7, 2024
Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.
References