Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Device (Firewall)  >   Palo Alto PAN-OS Vendors:   Palo Alto Networks
Palo Alto PAN-OS Access Control Flaw Lets Remote Users Conduct Server-Side Request Forgery Attacks
SecurityTracker Alert ID:  1040005
SecurityTracker URL:
CVE Reference:   CVE-2017-15943   (Links to External Site)
Date:  Dec 13 2017
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Palo Alto PAN-OS. A remote user can conduct server-side request forgery attacks.

A remote user can supply specially crafted configuration file data that references external entities that, when imported by the target authenticated user via the management interface's configuration file import function for applications, spyware, and vulnerability objects, will connect to and disclose potentially sensitive information to the remote user.

Ekzhin Ear from NATO reported this vulnerability.

Impact:   A remote user can obtain potentially sensitive information on the target system.
Solution:   The vendor has issued a fix (6.1.19, 7.0.19, 7.1.14).

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Access control error, Input validation error

Message History:   None.

 Source Message Contents



Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC