<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/477511#M3912</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Vulnerability Name:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;11213:HTTP TRACE / TRACK Methods Allowed&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Affected Hosts, Port(s), Vulnerability IDs:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Panmigration tool , tcp:80, 11213&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I see this Vulnerability on the Expedition Migration tool. Could you please suggest mitigation plan?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2022 08:06:05 GMT</pubDate>
    <dc:creator>ShravanKumar</dc:creator>
    <dc:date>2022-04-01T08:06:05Z</dc:date>
    <item>
      <title>Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/477511#M3912</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Vulnerability Name:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;11213:HTTP TRACE / TRACK Methods Allowed&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Affected Hosts, Port(s), Vulnerability IDs:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Panmigration tool , tcp:80, 11213&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I see this Vulnerability on the Expedition Migration tool. Could you please suggest mitigation plan?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 08:06:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/477511#M3912</guid>
      <dc:creator>ShravanKumar</dc:creator>
      <dc:date>2022-04-01T08:06:05Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/477623#M3915</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/136033"&gt;@ShravanKumar&lt;/a&gt;&amp;nbsp;httpd is not enabled in Expedition VM, you can try to validate using below command :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;curl -i expedition -X TRACE &lt;A href="http://{yourexpediitonIP}" target="_blank" rel="noopener"&gt;http://{yourexpeditionIP}/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;You should get response back like below:&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;curl: (7) Failed to connect to {yourexpeditionIP} port 80: Connection refused&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 16:44:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/477623#M3915</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2022-04-01T16:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/478606#M3932</link>
      <description>&lt;P&gt;Hi Lychiang,&lt;/P&gt;
&lt;P&gt;Thanks for the reply. I'm getting below. May I know is this something we can mitigate on the server level? as this is a custom tool?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;shravaxxxxx:~ shravaxxxxx$ curl -i panmig-xxxx.xxx.vmware.com&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;-X TRACE &lt;A href="http://10.166.xxx.xxx" target="_blank"&gt;http://10.166.xxx.xxx&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;HTTP/1.1 200 OK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Date&lt;/STRONG&gt;: Wed, 06 Apr 2022 09:33:12 GMT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Server&lt;/STRONG&gt;: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips PHP/5.6.7&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Transfer-Encoding&lt;/STRONG&gt;: chunked&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Content-Type&lt;/STRONG&gt;: message/http&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;TRACE / HTTP/1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Host: panmig-xxx.xxx.vmware.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;User-Agent: curl/7.77.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Accept: */*&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;HTTP/1.1 200 OK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Date&lt;/STRONG&gt;: Wed, 06 Apr 2022 09:33:15 GMT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Server&lt;/STRONG&gt;: Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips PHP/5.6.7&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Transfer-Encoding&lt;/STRONG&gt;: chunked&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;&lt;STRONG&gt;Content-Type&lt;/STRONG&gt;: message/http&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;TRACE / HTTP/1.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Host: 10.166.xxx.xxx&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;User-Agent: curl/7.77.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Accept: */*&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p2"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;shravxxxxx-a02:~&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 10:03:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/478606#M3932</guid>
      <dc:creator>ShravanKumar</dc:creator>
      <dc:date>2022-04-06T10:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/478687#M3933</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which version of Expedition are you running?&lt;/P&gt;
&lt;P&gt;The signature that we see from your running command refers to CentOS, but Expedition is offered under Ubuntu.&lt;/P&gt;
&lt;P&gt;Also, I do not think we expose the tcp/80 on Expedition. When available, it directly redirects to tcp/443.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are you certain you are targeting an Expedition instance?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 16:29:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/478687#M3933</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2022-04-06T16:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/478891#M3934</link>
      <description>&lt;P&gt;I'm sure I'm targetting expedition tool IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have deployed this tool on a Centos VM in our environment... do you think this Vulnerability is detected for that server? and not the tool?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 08:17:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/478891#M3934</guid>
      <dc:creator>ShravanKumar</dc:creator>
      <dc:date>2022-04-07T08:17:22Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/479576#M3939</link>
      <description>&lt;P&gt;I'm sure I'm targetting expedition tool IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have deployed this tool on a Centos VM in our environment... do you think this Vulnerability is detected for that server? and not the tool?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 06:39:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/479576#M3939</guid>
      <dc:creator>ShravanKumar</dc:creator>
      <dc:date>2022-04-11T06:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/479695#M3940</link>
      <description>&lt;P&gt;Could be, then please follow the suggested remediation method for centos&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2022 17:18:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/479695#M3940</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2022-04-11T17:18:05Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/480175#M3946</link>
      <description>&lt;P&gt;May I know what is the root password of Expedition tool? and how to check the current version and what is the procedure to upgrade to next version?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 13:46:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/480175#M3946</guid>
      <dc:creator>ShravanKumar</dc:creator>
      <dc:date>2022-04-13T13:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability Name: 11213:HTTP TRACE / TRACK Methods Allowed</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/480195#M3947</link>
      <description>&lt;P&gt;by default is "paloalto" but you could give&amp;nbsp; specific root password during ubuntu installation,&amp;nbsp; You can login to the expedition GUI and check the version in the dashboard, in the ubuntu CLI, you issue below commands to upgrade the tool to the latest version:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sudo apt-get update&lt;/P&gt;
&lt;P&gt;sudo apt-get install expedition-beta&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 16:48:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/vulnerability-name-11213-http-trace-track-methods-allowed/m-p/480195#M3947</guid>
      <dc:creator>lychiang</dc:creator>
      <dc:date>2022-04-13T16:48:28Z</dc:date>
    </item>
  </channel>
</rss>

