Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-11510 PoC — Pulse Secure Pulse Connect Secure 路径遍历漏洞

Source
Associated Vulnerability
Title:Pulse Secure Pulse Connect Secure 路径遍历漏洞 (CVE-2019-11510)
Description:Pulse Secure Pulse Connect Secure(又名PCS,前称Juniper Junos Pulse)是美国Pulse Secure公司的一套SSL VPN解决方案。 Pulse Secure PCS 9.0RX版本、8.3RX版本和8.2RX版本中存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Readme
# CVE-2019-11510-PulseVPN

In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability.

exploit.sh = Exploring Vulnerability.

detect-pulse.sh = Checks a list of IP's which are running Pulse Secure.

dr4x-wordlist.sh = It triggers exploit.sh only in the form of a wordlist looking at several sites in a file and saying if it is vulnerable.

example: ./exploit.sh -d vpn.target.com
File Snapshot

[4.0K] /data/pocs/9f54ea20e353eb2d694627ec060d036f906a633b ├── [ 514] pulse-secure.sh └── [ 549] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.