A vulnerability in the Pulse Connect Secure < 9.1R9 admin web interface could allow an authenticated attacker to perform an arbitrary code execution using uncontrolled gzip extraction.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 | Broken Link Vendor Advisory |
| http://packetstormsecurity.com/files/160619/Pulse-Secure-VPN-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
| https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44601 | Broken Link Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-8260 | US Government Resource |
Configurations
Configuration 1 (hide)
|
History
30 Oct 2025, 20:40
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-8260 - US Government Resource |
Information
Published : 2020-10-28 13:15
Updated : 2025-10-30 20:40
NVD link : CVE-2020-8260
Mitre link : CVE-2020-8260
CVE.ORG link : CVE-2020-8260
JSON object : View
Products Affected
ivanti
- connect_secure
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
