Palo Alto PAN-OS Access Control Flaw Lets Remote Users Conduct Server-Side Request Forgery Attacks
|
SecurityTracker Alert ID: 1040005 |
SecurityTracker URL: http://securitytracker.com/id/1040005
|
CVE Reference:
CVE-2017-15943
(Links to External Site)
|
Date: Dec 13 2017
|
Impact:
Disclosure of system information, Disclosure of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Palo Alto PAN-OS. A remote user can conduct server-side request forgery attacks.
A remote user can supply specially crafted configuration file data that references external entities that, when imported by the target authenticated user via the management interface's configuration file import function for applications, spyware, and vulnerability objects, will connect to and disclose potentially sensitive information to the remote user.
Ekzhin Ear from NATO reported this vulnerability.
|
Impact:
A remote user can obtain potentially sensitive information on the target system.
|
Solution:
The vendor has issued a fix (6.1.19, 7.0.19, 7.1.14).
The vendor advisory is available at:
https://securityadvisories.paloaltonetworks.com/Home/Detail/99
|
Vendor URL: securityadvisories.paloaltonetworks.com/Home/Detail/99 (Links to External Site)
|
Cause:
Access control error, Input validation error
|
|
Message History:
None.
|
Source Message Contents
|
Subject: https://securityadvisories.paloaltonetworks.com/Home/Detail/99
|
|
|