<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISSUES WITH CUSTOM VULNERABILITY in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/issues-with-custom-vulnerability/m-p/13207#M341</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest you look for /jwplayer/player.swf in the http-req-uri and a length of greater than 0 for the http-req-param-length.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Dec 2012 22:27:58 GMT</pubDate>
    <dc:creator>tettema</dc:creator>
    <dc:date>2012-12-13T22:27:58Z</dc:date>
    <item>
      <title>ISSUES WITH CUSTOM VULNERABILITY</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/issues-with-custom-vulnerability/m-p/13206#M340</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;Hi All,&lt;BR /&gt; &lt;BR /&gt; We are making the creation of a "Custom Signature" to detect an XSS vulnerability identified in the player JWPLAYER&lt;/P&gt;&lt;P&gt; The vulnerability occurs in / media / players / jwplayer / player.swf and HDSMediaProvider.swf. &lt;BR /&gt; Model: PA-4050&lt;BR /&gt; Software Version: 4.0.11&lt;/P&gt;&lt;P&gt; &lt;BR /&gt; For this we register accesses can be made to the player JWPLAYER with parameters in the URL.&lt;BR /&gt; Examples:&lt;BR /&gt; &lt;A href="http://www.xxxx.xx/media/players/jwplayer/player.swf?abouttext=xxxxxx&amp;amp;aboutlink=http://www.xxxx.xxx" target="_blank"&gt;http://www.xxxx.xx/media/players/jwplayer/player.swf?abouttext=xxxxxx&amp;amp;aboutlink=http://www.xxxx.xxx&lt;/A&gt;&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;A href="http://www.xxxxx.xx/media/players/jwplayer/player.swf?file=http://xxxxx.xxx&amp;amp;image=http://" target="_blank"&gt;http://www.xxxxx.xx/media/players/jwplayer/player.swf?file=http://xxxxx.xxx&amp;amp;image=http://&lt;/A&gt;xxxx.xxxx&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;A href="http://www.xxxxx.xx/media/players/jwplayer/player.swf?file=http://xxxxxx.xxx&amp;amp;logo.file=http://xxxxx.xxx&amp;amp;logo.link=" target="_blank"&gt;http://www.xxxxx.xx/media/players/jwplayer/player.swf?file=http://xxxxxx.xxx&amp;amp;logo.file=http://xxxxx.xxx&amp;amp;logo.link=&lt;/A&gt;xxxxxxx&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;BR /&gt; &lt;BR /&gt; To create it first was used in an attempt to record all requests containing .swf? and indicating the call with parameters:&lt;BR /&gt; OPERATOR: Pattern Match&lt;BR /&gt; CONTEXT: REQ-HTTP-HEADERS&lt;BR /&gt; PATTERN: .*jwplayer /. *swf \? (.*) Also with&amp;nbsp; ".*jwplayer /. *swf \?"&lt;BR /&gt; This rule did not detect the parameters&lt;BR /&gt; &lt;BR /&gt; Then we used 2 conditions with the following configuration:&lt;BR /&gt; And Condition 1:&lt;BR /&gt;&amp;nbsp; OPERATOR: PATTERN-MATCH&lt;BR /&gt;&amp;nbsp; CONTEXT: HTTP-REQ-URI-PATH&lt;BR /&gt;&amp;nbsp; PATTERN: .*jwplayer /.*swf&lt;BR /&gt; And Condition 2&lt;BR /&gt;&amp;nbsp; OPERATOR: PATTERN-MATCH&lt;BR /&gt;&amp;nbsp; CONTEXT: HTTP-REQ-PARAMS&lt;BR /&gt;&amp;nbsp; PATTERN: .*((file)|(abouttext)|(image)) While it should detect any url parameter, these are the ones who were using for testing.&lt;BR /&gt; &lt;BR /&gt; But it happened that not all parameters are detected. Therefore, the pattern will change to ((.+)|(abouttext)), since the minimum length is 7, but still does not detect any parameter.&lt;/P&gt;&lt;P style="margin-top: auto; margin-bottom: auto;"&gt;&lt;SPAN id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;The purpose&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;of&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;the rule&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;is to detect any&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;url&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;with&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;parameters&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the google translation&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 11:39:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/issues-with-custom-vulnerability/m-p/13206#M340</guid>
      <dc:creator>noc_soc</dc:creator>
      <dc:date>2012-12-13T11:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISSUES WITH CUSTOM VULNERABILITY</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/issues-with-custom-vulnerability/m-p/13207#M341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest you look for /jwplayer/player.swf in the http-req-uri and a length of greater than 0 for the http-req-param-length.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2012 22:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/issues-with-custom-vulnerability/m-p/13207#M341</guid>
      <dc:creator>tettema</dc:creator>
      <dc:date>2012-12-13T22:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: ISSUES WITH CUSTOM VULNERABILITY</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/issues-with-custom-vulnerability/m-p/13208#M342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN class="short_text" id="result_box" lang="en"&gt;&lt;SPAN class="hps"&gt;It's&lt;/SPAN&gt; &lt;SPAN class="hps"&gt;just what we need&lt;/SPAN&gt;.&lt;BR /&gt;&lt;SPAN class="hps"&gt;Thanks for the reply&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 11:22:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/issues-with-custom-vulnerability/m-p/13208#M342</guid>
      <dc:creator>noc_soc</dc:creator>
      <dc:date>2012-12-17T11:22:07Z</dc:date>
    </item>
  </channel>
</rss>

