<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Custom vulnerability object trigger in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/594432#M5648</link>
    <description>&lt;P&gt;Trying to use a custom vulnerability object to raise a threat alert when a user directly enters a request for access to an IPv4 address . eg &lt;A href="http://12.34.56.78" target="_blank"&gt;http://12.34.56.78&lt;/A&gt;&amp;nbsp; .&amp;nbsp; Ive created a object , with a pattern of&amp;nbsp;(.*((?:\d{1,3}\.){3}\d{1,3})) and applied it to a vulnerability profile that is applied to a bunch of rules .&amp;nbsp; &amp;nbsp;I can see the rules triggered but the vulnerability is not logging as a threat , ive also had the converse where a normal URL eg &lt;A href="http://www.xyz.com" target="_blank"&gt;http://www.xyz.com&lt;/A&gt;&amp;nbsp;is being flagged as a vulnerability as a false positive .&amp;nbsp; &amp;nbsp; Anyone had success (consistently) with custom vulnerability objects using regex patterns ?&amp;nbsp; &amp;nbsp; the field im using the regex pattern against is http-req-host-headers&lt;/P&gt;</description>
    <pubDate>Fri, 09 Aug 2024 02:18:44 GMT</pubDate>
    <dc:creator>M.Bathgate</dc:creator>
    <dc:date>2024-08-09T02:18:44Z</dc:date>
    <item>
      <title>Custom vulnerability object trigger</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/594432#M5648</link>
      <description>&lt;P&gt;Trying to use a custom vulnerability object to raise a threat alert when a user directly enters a request for access to an IPv4 address . eg &lt;A href="http://12.34.56.78" target="_blank"&gt;http://12.34.56.78&lt;/A&gt;&amp;nbsp; .&amp;nbsp; Ive created a object , with a pattern of&amp;nbsp;(.*((?:\d{1,3}\.){3}\d{1,3})) and applied it to a vulnerability profile that is applied to a bunch of rules .&amp;nbsp; &amp;nbsp;I can see the rules triggered but the vulnerability is not logging as a threat , ive also had the converse where a normal URL eg &lt;A href="http://www.xyz.com" target="_blank"&gt;http://www.xyz.com&lt;/A&gt;&amp;nbsp;is being flagged as a vulnerability as a false positive .&amp;nbsp; &amp;nbsp; Anyone had success (consistently) with custom vulnerability objects using regex patterns ?&amp;nbsp; &amp;nbsp; the field im using the regex pattern against is http-req-host-headers&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2024 02:18:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/594432#M5648</guid>
      <dc:creator>M.Bathgate</dc:creator>
      <dc:date>2024-08-09T02:18:44Z</dc:date>
    </item>
    <item>
      <title>Re: Custom vulnerability object trigger</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595470#M5697</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/222803057"&gt;@M.Bathgate&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;As mentioned here - &lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/http-req-host-header" target="_blank"&gt;http-req-host-header Context (paloaltonetworks.com)&lt;/A&gt; you may need to specify start and end anchors&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;To initiate an exact match search, you must add a &amp;lt;space&amp;gt; before the pattern and ‘\r\n’ after the pattern on PAN-OS 9.1 and earlier. Starting with PAN-OS 10.0 you can use the following anchor characters: ^ and $ to specify a string start and end.&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;Also are you applying SSL decryption for this traffic? As you try to check the HTTP host header the firewall will need to decrypt the traffic first.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If not, you may need to use &lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/string-contexts/ssl-req-chello-sni" target="_blank"&gt;ssl-req-chello-sni (paloaltonetworks.com)&lt;/A&gt; for context&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 12:07:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595470#M5697</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2024-08-21T12:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: Custom vulnerability object trigger</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595513#M5701</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp; tried those ^ $&amp;nbsp; wasnt sure if they were working or not at the time, as they seemed to make no difference .&amp;nbsp; Re SSL , yes decrypted . As a test ive tried test sites under http and https , and again mixed results . Wondering if the policy isnt getting consistently applied for some reason&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 20:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595513#M5701</guid>
      <dc:creator>M.Bathgate</dc:creator>
      <dc:date>2024-08-21T20:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Custom vulnerability object trigger</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595581#M5706</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/222803057"&gt;@M.Bathgate&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share the full custom vulnerability obect that you have created?&lt;/P&gt;
&lt;P&gt;Are you using any &lt;A href="https://docs.paloaltonetworks.com/pan-os/u-v/custom-app-id-and-threat-signatures/custom-application-and-threat-signatures/custom-signature-contexts/context-qualifiers" target="_blank"&gt;Context Qualifiers (paloaltonetworks.com)&lt;/A&gt; ?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 06:12:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595581#M5706</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2024-08-22T06:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: Custom vulnerability object trigger</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595694#M5714</link>
      <description>&lt;P&gt;Those context qualifiers look interesting , but i havent used them , all ive done is a basic vulnerability object under custom objects , with a signature pattern specified against the&amp;nbsp;http-req-host-header . Thanks for the headsup regarding context qualifiers , they look useful for some other purposes&lt;/P&gt;</description>
      <pubDate>Thu, 22 Aug 2024 21:48:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/custom-vulnerability-object-trigger/m-p/595694#M5714</guid>
      <dc:creator>M.Bathgate</dc:creator>
      <dc:date>2024-08-22T21:48:12Z</dc:date>
    </item>
  </channel>
</rss>

