{"containers":{"cna":{"affected":[{"product":"Pulse Connect Secure","vendor":"n/a","versions":[{"status":"affected","version":"Fixed in 9.1R8.2"}]}],"descriptions":[{"lang":"en","value":"A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to gain arbitrary file reading access through Pulse Collaboration via XML External Entity (XXE) vulnerability."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-611","description":"XML External Entities (XXE) (CWE-611)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-08-01T14:27:31.000Z","orgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","shortName":"hackerone"},"references":[{"tags":["x_refsource_MISC"],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588"},{"tags":["x_refsource_MISC"],"url":"https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"support@hackerone.com","ID":"CVE-2020-8256","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Pulse Connect Secure","version":{"version_data":[{"version_value":"Fixed in 9.1R8.2"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the Pulse Connect Secure < 9.1R8.2 admin web interface could allow an authenticated attacker to gain arbitrary file reading access through Pulse Collaboration via XML External Entity (XXE) vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"XML External Entities (XXE) (CWE-611)"}]}]},"references":{"reference_data":[{"name":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588","refsource":"MISC","url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588"},{"name":"https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/","refsource":"MISC","url":"https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T09:56:28.037Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44588"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.gosecure.net/blog/2020/11/13/forget-your-perimeter-part-2-four-vulnerabilities-in-pulse-connect-secure/"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-18T16:03:20.337535Z","id":"CVE-2020-8256","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-18T16:03:30.432Z"}}]},"cveMetadata":{"assignerOrgId":"36234546-b8fa-4601-9d6f-f4e334aa8ea1","assignerShortName":"hackerone","cveId":"CVE-2020-8256","datePublished":"2020-09-29T13:41:32.000Z","dateReserved":"2020-01-28T00:00:00.000Z","dateUpdated":"2024-11-18T16:03:30.432Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}