Pulse Secure 9.115 & Earlier Clientside HTTP Req. Smuggling Causing XSS
CVE-2022-21826 Published on September 30, 2022

Pulse Secure version 9.115 and below may be susceptible to client-side http request smuggling, When the application receives a POST request, it ignores the request's Content-Length header and leaves the POST body on the TCP/TLS socket. This body ends up prefixing the next HTTP request sent down that connection, this means when someone loads website attacker may be able to make browser issue a POST to the application, enabling XSS.

NVD

Weakness Type

What is a HTTP Request Smuggling Vulnerability?

When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it.

CVE-2022-21826 has been classified to as a HTTP Request Smuggling vulnerability or weakness.


Products Associated with CVE-2022-21826

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-21826 are published in these products:

 
 

Exploit Probability

EPSS
8.84%
Percentile
92.37%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.