PulseSSL VPN Site with Compromised Creds @ ████

Disclosed: 2020-07-30 17:48:46 By r00tpgp To deptofdefense
Critical
Vulnerability Details
Dear US DoD, Back in 2019, I had reported that a pulseSSL VPN server owned by US DoD can be compromised by a publicly available exploit. The report is████████. As a result, the userid and passwd db was also compromised. I found that at least 1 userid and password combination from that compromised db can still be used. ##PoC Here is a screenshot of me accessing a US DoD owned website using a compromised credentials found back in 2019. I am still able to login to https://████/dana-na/auth/url_3/welcome.cgi with: l: █████████ p: █████ █████ Here is the screenshot of the credentials that was dump back in 2019: ████ ## Impact It is widely reported in the media that blackhat hackers around the world are still hacking fully patched PulseSSL VPN hosts because owners did not change the passwords that was compromised back in 2019. The articles that I am referring to is at : https://www.us-cert.gov/ncas/alerts/aa20-107a https://thehackernews.com/2020/04/pulse-secure-vpn-vulnerability.html ##Fix Other than patching, it is strongly advisable that the impacted organization `█████████` reset all passwords immediately.
Actions
View on HackerOne
Report Stats
  • Report ID: 854049
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report