SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Palo Alto PAN-OS Vendors:   Palo Alto Networks
(Palo Alto Networks Issues Fix for Palo Alto PAN-OS) wget HTTP Redirect Bug Lets Remote Users Write Files on the Target System
SecurityTracker Alert ID:  1038544
SecurityTracker URL:  http://securitytracker.com/id/1038544
CVE Reference:   CVE-2016-4971   (Links to External Site)
Date:  May 23 2017
Impact:   Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.1.16 and prior, 7.0.14 and prior, 7.1.9 and prior, 8.0
Description:   A vulnerability was reported in wget. A remote user can write files on the target system. Palo Alto PAN-OS is affected.

A remote server can return a specially crafted HTTP redirect message with an FTP server Location value to cause the target user's wget application to download and write or overwrite an arbitrary file from the specified FTP server to the target user's current directory.

Some demonstration exploit code is available at:

http://legalhackers.com/advisories/Wget-Arbitrary-File-Upload-Vulnerability-Exploit.txt

Dawid Golunski (via Beyond Security's SecuriTeam) reported this vulnerability.

Impact:   A remote user can write files on the target system.
Solution:   The Palo Alto Networks has issued a fix (6.1.17, 7.0.15, 7.1.10, 8.0.1).

The Palo Alto Networks advisory is available at:

https://securityadvisories.paloaltonetworks.com/Home/Detail/86

Vendor URL:  securityadvisories.paloaltonetworks.com/Home/Detail/86 (Links to External Site)
Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Jun 20 2016 wget HTTP Redirect Bug Lets Remote Users Write Files on the Target System



 Source Message Contents

Subject:  https://securityadvisories.paloaltonetworks.com/Home/Detail/86


CVE-2016-4971
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC