CVE-2021-44720 (GCVE-0-2021-44720)
Vulnerability from cvelistv5 – Published: 2022-08-11 15:49 – Updated: 2024-08-04 04:32
VLAI?
Summary
In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the "Maintenance > Push Configuration > Targets > Target Name" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:32:12.296Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kb.pulsesecure.net/?atype=sa"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the \"Maintenance \u003e Push Configuration \u003e Targets \u003e Target Name\" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-08-11T15:49:27",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kb.pulsesecure.net/?atype=sa"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-44720",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the \"Maintenance \u003e Push Configuration \u003e Targets \u003e Target Name\" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kb.pulsesecure.net/?atype=sa",
"refsource": "MISC",
"url": "https://kb.pulsesecure.net/?atype=sa"
},
{
"name": "https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84",
"refsource": "MISC",
"url": "https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-44720",
"datePublished": "2022-08-11T15:49:27",
"dateReserved": "2021-12-08T00:00:00",
"dateUpdated": "2024-08-04T04:32:12.296Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F450898-0B06-4073-9B76-BF22F68BD14F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B21C181-DC49-4EBD-9932-DBB337151FF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AA4B39F-2FB9-4752-B1F1-18812B0990B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABD840BF-944E-4F4C-96DC-0256286338F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*\", \"matchCriteriaId\": \"366EF5B8-0233-49B8-806A-E54F60410ADE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F2A7F5C-1D78-4D19-B8ED-5822FDF5DA63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FEFC4B1-7350-46F9-80C1-42F5AE06142F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB7A6D62-6576-4713-9BF4-11068A72E8B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*\", \"matchCriteriaId\": \"843BC1B9-50CC-4F8F-A454-A0CEC6E92290\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5355372-03EA-46D7-9104-A2785C29B664\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DE32A0C-8944-4F51-A286-266055CA4B2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0349A0CC-A372-4E51-899E-D7BA67876F4B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*\", \"matchCriteriaId\": \"93D1A098-BD77-4A7B-9070-A764FB435981\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CCC2D7B-F835-45EC-A316-2F0C5F2CF565\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD812596-C77C-4129-982F-C22A25B52126\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FA0B20D-3FA1-42AE-BDC5-93D8A182927C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFFA0B02-7F6D-4434-B1E7-EB8520FD68A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFE8FA87-9622-4D5B-99C7-D8EE230C0AA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*\", \"matchCriteriaId\": \"16DAA769-8F0D-4C54-A8D9-9902995605B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C10C89-1DBC-4E91-BD28-D5097B589CA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"9.1\", \"matchCriteriaId\": \"43AF1D62-D827-4495-A4B0-CCA0C2BEE68F\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the \\\"Maintenance \u003e Push Configuration \u003e Targets \u003e Target Name\\\" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.\"}, {\"lang\": \"es\", \"value\": \"En Ivanti Pulse Secure Pulse Connect Secure (PCS) versiones anteriores a 9.1R12, la contrase\\u00f1a del administrador se almacena en el c\\u00f3digo fuente HTML de la pantalla \\\"Maintenance ) Push Configuration ) Targets ) Target Name\\\" targets.cgi. Un usuario administrativo de s\\u00f3lo lectura puede escalar a un rol administrativo de lectura y escritura.\"}]",
"id": "CVE-2021-44720",
"lastModified": "2024-11-21T06:31:27.577",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}]}",
"published": "2022-08-12T15:15:09.170",
"references": "[{\"url\": \"https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kb.pulsesecure.net/?atype=sa\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://kb.pulsesecure.net/?atype=sa\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-798\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-44720\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-08-12T15:15:09.170\",\"lastModified\":\"2024-11-21T06:31:27.577\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Ivanti Pulse Secure Pulse Connect Secure (PCS) before 9.1R12, the administrator password is stored in the HTML source code of the \\\"Maintenance \u003e Push Configuration \u003e Targets \u003e Target Name\\\" targets.cgi screen. A read-only administrative user can escalate to a read-write administrative role.\"},{\"lang\":\"es\",\"value\":\"En Ivanti Pulse Secure Pulse Connect Secure (PCS) versiones anteriores a 9.1R12, la contrase\u00f1a del administrador se almacena en el c\u00f3digo fuente HTML de la pantalla \\\"Maintenance ) Push Configuration ) Targets ) Target Name\\\" targets.cgi. Un usuario administrativo de s\u00f3lo lectura puede escalar a un rol administrativo de lectura y escritura.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F450898-0B06-4073-9B76-BF22F68BD14F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B21C181-DC49-4EBD-9932-DBB337151FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA4B39F-2FB9-4752-B1F1-18812B0990B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD840BF-944E-4F4C-96DC-0256286338F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"366EF5B8-0233-49B8-806A-E54F60410ADE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2A7F5C-1D78-4D19-B8ED-5822FDF5DA63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FEFC4B1-7350-46F9-80C1-42F5AE06142F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB7A6D62-6576-4713-9BF4-11068A72E8B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*\",\"matchCriteriaId\":\"843BC1B9-50CC-4F8F-A454-A0CEC6E92290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5355372-03EA-46D7-9104-A2785C29B664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DE32A0C-8944-4F51-A286-266055CA4B2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0349A0CC-A372-4E51-899E-D7BA67876F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*\",\"matchCriteriaId\":\"93D1A098-BD77-4A7B-9070-A764FB435981\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCC2D7B-F835-45EC-A316-2F0C5F2CF565\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD812596-C77C-4129-982F-C22A25B52126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA0B20D-3FA1-42AE-BDC5-93D8A182927C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFA0B02-7F6D-4434-B1E7-EB8520FD68A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFE8FA87-9622-4D5B-99C7-D8EE230C0AA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*\",\"matchCriteriaId\":\"16DAA769-8F0D-4C54-A8D9-9902995605B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C10C89-1DBC-4E91-BD28-D5097B589CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pulsesecure:pulse_connect_secure:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.1\",\"matchCriteriaId\":\"43AF1D62-D827-4495-A4B0-CCA0C2BEE68F\"}]}]}],\"references\":[{\"url\":\"https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.pulsesecure.net/?atype=sa\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kb.pulsesecure.net/?atype=sa\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…