<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/445012#M2094</link>
    <description>&lt;P&gt;Yes, we just enrolled in continuous vulnerability scanning and this is one of their findings for us as well.&lt;/P&gt;</description>
    <pubDate>Tue, 02 Nov 2021 16:34:15 GMT</pubDate>
    <dc:creator>jstein</dc:creator>
    <dc:date>2021-11-02T16:34:15Z</dc:date>
    <item>
      <title>GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/432405#M1689</link>
      <description>&lt;P&gt;Has anyone scanned their GlobalProtect Portals/Gateways with a Qualys WAS scanner?&amp;nbsp; With GP running version 10.0.x, it's reporting back QID 150307&amp;nbsp;External Service interaction via Host Header Injection.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The scanner injects a special FQDN in the Host header and X-Forwarded-Host header. Qualys Periscope is used to detect any subsequent DNS request and identify the presence of the vulnerability.&lt;BR /&gt;Impact&lt;BR /&gt;Attackers can potentially redirect users to unintended servers under the attacker's control. Other possible consequences include altered control flow, arbitrary control of a resource, arbitrary code execution. XSS, access to internal hosts, web cache poisoning, or HTML injection.&lt;BR /&gt;Solution&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 17:32:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/432405#M1689</guid>
      <dc:creator>jmurphy</dc:creator>
      <dc:date>2021-09-07T17:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/445012#M2094</link>
      <description>&lt;P&gt;Yes, we just enrolled in continuous vulnerability scanning and this is one of their findings for us as well.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 16:34:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/445012#M2094</guid>
      <dc:creator>jstein</dc:creator>
      <dc:date>2021-11-02T16:34:15Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/445034#M2095</link>
      <description>&lt;P&gt;Same question here.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 18:10:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/445034#M2095</guid>
      <dc:creator>Flaster135</dc:creator>
      <dc:date>2021-11-02T18:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/503677#M2871</link>
      <description>&lt;P&gt;Palo Alto and feedback?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 22:37:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/503677#M2871</guid>
      <dc:creator>jstein</dc:creator>
      <dc:date>2022-06-14T22:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/512671#M3099</link>
      <description>&lt;P&gt;Was there ever any resolution to this?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2022 13:15:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/512671#M3099</guid>
      <dc:creator>bburstein</dc:creator>
      <dc:date>2022-08-23T13:15:02Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/532721#M3740</link>
      <description>&lt;P&gt;I know this is several months old, but was there ever a resolution for this?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Mar 2023 17:29:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/532721#M3740</guid>
      <dc:creator>Benzito</dc:creator>
      <dc:date>2023-03-01T17:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/532722#M3741</link>
      <description>Not that I have seen.&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Mar 2023 17:30:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/532722#M3741</guid>
      <dc:creator>jstein</dc:creator>
      <dc:date>2023-03-01T17:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/537512#M3873</link>
      <description>&lt;P&gt;Hello, was there an update or fix for this?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 00:30:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/537512#M3873</guid>
      <dc:creator>Benzito</dc:creator>
      <dc:date>2023-04-04T00:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Qualys: 150307 External Service interaction via Host Header Injection</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/539722#M3968</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Palo Alto PSIRT looked into this and determined it is a false positive.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 15:37:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-qualys-150307-external-service-interaction-via/m-p/539722#M3968</guid>
      <dc:creator>DaBone</dc:creator>
      <dc:date>2023-04-21T15:37:48Z</dc:date>
    </item>
  </channel>
</rss>

