Files
CVEs-PoC/2021/CVE-2021-22899.md
2025-09-29 21:09:30 +02:00

21 lines
943 B
Markdown

### [CVE-2021-22899](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22899)
![](https://img.shields.io/static/v1?label=Product&message=Pulse%20Connect%20Secure&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Fixed%20in%209.1R11.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection%20-%20Generic%20(CWE-77)&color=brightgreen)
### Description
A command injection vulnerability exists in Pulse Connect Secure before 9.1R11.4 allows a remote authenticated attacker to perform remote code execution via Windows Resource Profiles Feature
### POC
#### Reference
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/?kA23Z000000boUWSAY
#### Github
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors