SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Firewall)  >   Palo Alto PAN-OS Vendors:   Palo Alto Networks
Palo Alto PAN-OS Access Control Flaw Lets Remote Users Conduct Server-Side Request Forgery Attacks
SecurityTracker Alert ID:  1040005
SecurityTracker URL:  http://securitytracker.com/id/1040005
CVE Reference:   CVE-2017-15943   (Links to External Site)
Date:  Dec 13 2017
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Palo Alto PAN-OS. A remote user can conduct server-side request forgery attacks.

A remote user can supply specially crafted configuration file data that references external entities that, when imported by the target authenticated user via the management interface's configuration file import function for applications, spyware, and vulnerability objects, will connect to and disclose potentially sensitive information to the remote user.

Ekzhin Ear from NATO reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive information on the target system.
Solution:   The vendor has issued a fix (6.1.19, 7.0.19, 7.1.14).

The vendor advisory is available at:

https://securityadvisories.paloaltonetworks.com/Home/Detail/99

Vendor URL:  securityadvisories.paloaltonetworks.com/Home/Detail/99 (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.


 Source Message Contents

Subject:  https://securityadvisories.paloaltonetworks.com/Home/Detail/99

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC