<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect - Redirection via Arbitrary Host Header Manipulation in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562598#M4547</link>
    <description>&lt;P&gt;Case # 02750366 submitted to support as I've had to take time out for this issue far too many times now.&lt;/P&gt;</description>
    <pubDate>Fri, 20 Oct 2023 15:48:27 GMT</pubDate>
    <dc:creator>SturgisIT</dc:creator>
    <dc:date>2023-10-20T15:48:27Z</dc:date>
    <item>
      <title>Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/559138#M4418</link>
      <description>&lt;P&gt;Having ran a PCI DSS compliance scan it has come back that our Global Protect VPN setup is flagged as a failing vulnerability for&amp;nbsp;Redirection via Arbitrary Host Header Manipulation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have it setup to redirect to azure to authenticate account details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The solution they have given us to fix the issue is;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Implementing proper validation and sanitization of input headers is essential to mitigate the risks of Host header injection.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Whitelist domains, only allow permitted domains to be included in Host header.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How do we go about implementing&amp;nbsp;this.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 09:06:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/559138#M4418</guid>
      <dc:creator>Arachen</dc:creator>
      <dc:date>2023-09-22T09:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/559523#M4434</link>
      <description>&lt;P&gt;Ours doesn't even redirect that far out.&amp;nbsp; It merely redirects HTTP to HTTPS for local authentication in order to view the links to download the GlobalProtect client(s).&amp;nbsp;&amp;nbsp; One very unclear recommendation I saw a month or two back was to filter (deny) HTTP traffic (with no other details) but this seemed like a great way to break legitimate traffic for end users if not implemented correctly.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 14:32:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/559523#M4434</guid>
      <dc:creator>SturgisIT</dc:creator>
      <dc:date>2023-09-26T14:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/560081#M4455</link>
      <description>&lt;P&gt;Hi Arachen,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just ran a scan and received the exact same result as you. Everything passed except for the issue you're seeing as well. Were you ever able to figure out a fix for this issue?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 17:34:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/560081#M4455</guid>
      <dc:creator>AustinJohnson</dc:creator>
      <dc:date>2023-09-29T17:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562290#M4531</link>
      <description>&lt;P&gt;We are having the same issue with our PCI compliance scans for credit card processing. We do this quarterly and it just started failing this time so I guess the compliance scans are now flagging this. I's not enough to disable the portal landing page. A redirect to a non-existent page still occurs and that is what is being flagged.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We tried explicitly blocking the redirect page, but the redirect still occurs. This seems like something Palo Alto needs to address if they have not already. We have a support case open so we'll see if someone has an answer.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 16:30:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562290#M4531</guid>
      <dc:creator>MatthewFrank</dc:creator>
      <dc:date>2023-10-18T16:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562401#M4540</link>
      <description>&lt;P&gt;Was a resolution found to this issue?&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 11:56:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562401#M4540</guid>
      <dc:creator>janelle.provine</dc:creator>
      <dc:date>2023-10-19T11:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562593#M4546</link>
      <description>&lt;P&gt;No fix that I'm aware of.&amp;nbsp; I am raising a false positive report with PCI Assure which is the vendor I have to deal with and am looping them in on this forum post within that.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 15:10:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562593#M4546</guid>
      <dc:creator>SturgisIT</dc:creator>
      <dc:date>2023-10-20T15:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562598#M4547</link>
      <description>&lt;P&gt;Case # 02750366 submitted to support as I've had to take time out for this issue far too many times now.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 15:48:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/562598#M4547</guid>
      <dc:creator>SturgisIT</dc:creator>
      <dc:date>2023-10-20T15:48:27Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/563599#M4573</link>
      <description>&lt;P&gt;Hello Team, Is there any update from TAC on this we are seeing a similar issue.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2023 18:53:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/563599#M4573</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2023-10-30T18:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect - Redirection via Arbitrary Host Header Manipulation</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/564636#M4594</link>
      <description>&lt;P&gt;It appears support has attempted to call me several times but the call is not being accepted/connected.&amp;nbsp; That probably is not a PA issue however, as we've had many problems with our hosted VoIP provider.&amp;nbsp; Still, my ticket detail references this community discussion topic with a direct link to it and specifically asks, "If you would, please respond to this post with directions on how to block HTTP requests ONLY for the GlobalProtect portal."&lt;BR /&gt;&lt;BR /&gt;It would be nice for all if support could provide a guide here on how to work around this.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 16:04:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-redirection-via-arbitrary-host-header/m-p/564636#M4594</guid>
      <dc:creator>SturgisIT</dc:creator>
      <dc:date>2023-11-07T16:04:27Z</dc:date>
    </item>
  </channel>
</rss>

