Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-8248 PoC — Pulse Secure Pulse Desktop Client 安全漏洞

Source
Associated Vulnerability
Title:Pulse Secure Pulse Desktop Client 安全漏洞 (CVE-2020-8248)
Description:Pulse Secure Pulse Desktop Client是美国Pulse Secure公司的一套用于访问Juniper Pulse Secure网关的终端设备的客户端软件。 Pulse Secure Desktop Client (Linux) 9.1R9之前版本存在安全漏洞,攻击者可利用该漏洞升级特权。
Description
CVE-2020-8248: Privilege Escalation via Zip Wildcard Exploit in Pulse Secure VPN Linux Client
Readme
# CVE-2020-8248: Privilege Escalation via Zip Wildcard Exploit in Pulse Secure VPN Linux Client

The root SUID executable pulsesvc, has a function “do_upload” that unsafely calls a zip command with wildcards (“*”). By writing files with specifically crafted names, in a user- controlled folder (“~/.pulse_secure/pulse/”), an attacker can abuse the wildcards in order to pass custom flags to the “zip” executable resulting in code execution.

### NVD Disclosure:

The NVD disclosure for this vulnerability can be found [here](https://nvd.nist.gov/vuln/detail/CVE-2020-8248).

### Requirements:

The exploit targets code that is accessed post client authentication, that means that in order to exploit this vulnerability an attacker would require one of the 3 scenarios:
- Hosting an attacker-controlled Pulse VPN Server
- A valid SSL/TLS certificate to host a dummy VPN server (Can be easily done with
solutions such as “Let’s Encrypt”)
- Connecting to a legitimate Pulse VPN Server (User credentials/Client certificates
may be found directly on the compromised client)

### Proof Of Concept:

More details and the exploitation process can be found in this [PDF](https://github.com/mbadanoiu/CVE-2020-8248/blob/main/Pulse%20Secure%20VPN%20Linux%20Client%20-%20CVE-2020-8248.pdf).
File Snapshot

[4.0K] /data/pocs/e451a9c1d050d34a05887e6dbd74c0ddb6c23fb0 ├── [537K] Pulse Secure VPN Linux Client - CVE-2020-8248.pdf └── [1.3K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.