Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Palo Alto PAN-OS Vendors:   Palo Alto Networks
Palo Alto PAN-OS XML External Entity Processing Flaw in GlobalProtect Interface Lets Remote Users Obtain Potentially Sensitive Information
SecurityTracker Alert ID:  1039256
SecurityTracker URL:
CVE Reference:   CVE-2017-9458   (Links to External Site)
Date:  Sep 1 2017
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Palo Alto PAN-OS. A remote user can conduct XML external entity attacks to obtain information on the target system.

A remote user can supply specially crafted XML External Entity (XXE) data to the target GlobalProtect internal and external gateway interface to read files on the target system with the privileges of the target service.

A remote user may also be able to cause denial of service conditions or issue server side requests.

Systems configured with GlobalProtect are affected.

Alejandro Iacobelli and Nicolas Videla from Mercadolibre reported this vulnerability.

Impact:   A remote user can view information on the target system with the privileges of the target service.
Solution:   The vendor has issued a fix (6.1.18, 7.0.17, 7.1.12, 8.0.3).

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC