<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Patch Vulnerability - Plugin 43160 (CGI Generic SQL Injection) on GlobalProtect in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1244077#M6532</link>
    <description>&lt;P&gt;The default GP Portal Page can be disabled, so not allow users to try and log onto the web portal of the Global Protect.&lt;/P&gt;
&lt;P&gt;IThat would eliminate this issue/concern.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 17 Dec 2025 19:34:41 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2025-12-17T19:34:41Z</dc:date>
    <item>
      <title>How to Patch Vulnerability - Plugin 43160 (CGI Generic SQL Injection) on GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1244031#M6527</link>
      <description>&lt;DIV&gt;Body: We have detected a blind SQL injection vulnerability (Plugin ID: 43160) on GlobalProtect login CGI (/global-protect/login.esp) using Nessus.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Details: - CVSS Score: 7.5 (High) - Affected Parameter: 'action' - Example: /global-protect/login.esp?action=';WAITFOR DELAY '00:00:3';--&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Environment: PAN-OS version: [Your Version] GlobalProtect Portal: [Your Portal URL]&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Question: What is the recommended patch or configuration to mitigate this vulnerability?&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Is there an official fix or workaround from Palo Alto Networks?&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;References: &lt;A href="https://www.nessus.org/u?ed792cf5" target="_blank"&gt;https://www.nessus.org/u?ed792cf5&lt;/A&gt; &lt;A href="https://projects.webappsec.org/w/page/13246963/SQL%20Injection" target="_blank"&gt;https://projects.webappsec.org/w/page/13246963/SQL%20Injection&lt;/A&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 17 Dec 2025 05:21:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1244031#M6527</guid>
      <dc:creator>P.Namtien</dc:creator>
      <dc:date>2025-12-17T05:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: How to Patch Vulnerability - Plugin 43160 (CGI Generic SQL Injection) on GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1244032#M6528</link>
      <description>&lt;TABLE&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="label"&gt;Software Version&lt;/TD&gt;
&lt;TD class="data"&gt;11.2.4-h7&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 17 Dec 2025 05:23:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1244032#M6528</guid>
      <dc:creator>P.Namtien</dc:creator>
      <dc:date>2025-12-17T05:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to Patch Vulnerability - Plugin 43160 (CGI Generic SQL Injection) on GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1244077#M6532</link>
      <description>&lt;P&gt;The default GP Portal Page can be disabled, so not allow users to try and log onto the web portal of the Global Protect.&lt;/P&gt;
&lt;P&gt;IThat would eliminate this issue/concern.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Dec 2025 19:34:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1244077#M6532</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2025-12-17T19:34:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to Patch Vulnerability - Plugin 43160 (CGI Generic SQL Injection) on GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1250441#M6767</link>
      <description>&lt;P&gt;HI&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/407336397"&gt;@P.Namtien&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;Is there a official fix or did you disable the Landing Page?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Mar 2026 11:33:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/how-to-patch-vulnerability-plugin-43160-cgi-generic-sql/m-p/1250441#M6767</guid>
      <dc:creator>RyanAmstutz</dc:creator>
      <dc:date>2026-03-18T11:33:46Z</dc:date>
    </item>
  </channel>
</rss>

