![]() The server can set a malicious cookie (or it can be done via DNS Rebinding), which can be used to exploit a command injection when the user is found not compliant. Probably in order to still work with misconfigured instances, the Host Cheker does not check neither the validity of the server certificate nor its hostname. Of course client checks can always be bypassed, and an open source (yet not well documented) implementation do exist. ![]() While on Windows the plugin is an ActiveX component, in Linux, Solaris and OSX it is a Java Applet. Checks may include MAC Addresses, running process (ie: checking for an antivirus) and some others. The Host Checker requests a policy from the server and perform basic checks on the client accordingly. The Host Checker is a client side component that the Pulse Connect Secure appliance may require in order to connect to the VPN. Link to Juniper official advisory SA44426 Intro ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |