<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check and help resolving VAPT reported issues Global Protect SSL VPN Url in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/m-p/376158#M1006</link>
    <description>&lt;P&gt;Please open a case with Support.&lt;/P&gt;</description>
    <pubDate>Thu, 24 Dec 2020 22:52:17 GMT</pubDate>
    <dc:creator>mivaldi</dc:creator>
    <dc:date>2020-12-24T22:52:17Z</dc:date>
    <item>
      <title>Check and help resolving VAPT reported issues Global Protect SSL VPN Url</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/m-p/374153#M996</link>
      <description>&lt;P&gt;We have done VAPT on our Global protect URL link and identified 3 VA,&lt;BR /&gt;Kindly check and help resolving this at earliest.&lt;/P&gt;&lt;P&gt;1) Absence of CSRF tokens :-&lt;/P&gt;&lt;P&gt;No Anti-CSRF tokens were found in a HTML submission form.&lt;BR /&gt;A cross-site request forgery is an attack that involves forcing a victim to send an HTTP request to a target destination without their knowledge or intent in order to perform an action as the victim. The underlying cause is application functionality using predictable URL/form actions in a repeatable way. The nature of the attack is that CSRF exploits the trust that a web site has for a user. By contrast, cross-site scripting (XSS) exploits the trust that a user has for a web site. Like XSS, CSRF attacks are not necessarily cross-site, but they can be. Cross-site request forgery is also known as CSRF, XSRF, one-click attack, session riding, confused deputy, and sea surf.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Missing secure Flag Attributes in the Encrypted Session (SSL) Cookie:-&lt;/P&gt;&lt;P&gt;The Session Cookie Does Not Have "Secure" Attribute.The Secure Attribute Tells The Browser To Only Use This Cookie Via Secure/Encrypted Connections. This measure makes certain client-side attacks, such as cross-site scripting, slightly harder to exploit by preventing them from trivially capturing the cookie's value via an injected script.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;3) Referrer-Policy Header is not implemented:-&lt;/P&gt;&lt;P&gt;It was observed that, Referrer-policy is not implemented in response header.&lt;BR /&gt;Referrer-Policy is a security header designed to prevent cross-domain referrer leakage.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also, VAPT team has provided following links for 3 vulnerabilities&lt;/P&gt;&lt;P&gt;1) &lt;A href="http://projects.webappsec.org/Cross-Site-Request-Forgery" target="_blank"&gt;http://projects.webappsec.org/Cross-Site-Request-Forgery&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://cwe.mitre.org/data/definitions/352.html" target="_blank"&gt;http://cwe.mitre.org/data/definitions/352.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) &lt;A href="https://www.paladion.net/blogs/cookie-attributes-and-their-importance" target="_blank"&gt;https://www.paladion.net/blogs/cookie-attributes-and-their-importance&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://www.maravis.com/protecting-web-application-cookies-by-restricting-scope/" target="_blank"&gt;https://www.maravis.com/protecting-web-application-cookies-by-restricting-scope/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) &lt;A href="https://scotthelme.co.uk/a-new-security-header-referrer-policy/" target="_blank"&gt;https://scotthelme.co.uk/a-new-security-header-referrer-policy/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2020 12:20:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/m-p/374153#M996</guid>
      <dc:creator>PankajDhobe</dc:creator>
      <dc:date>2020-12-14T12:20:06Z</dc:date>
    </item>
    <item>
      <title>Re: Check and help resolving VAPT reported issues Global Protect SSL VPN Url</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/m-p/376158#M1006</link>
      <description>&lt;P&gt;Please open a case with Support.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Dec 2020 22:52:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/m-p/376158#M1006</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2020-12-24T22:52:17Z</dc:date>
    </item>
    <item>
      <title>Re: Check and help resolving VAPT reported issues Global Protect SSL VPN Url</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/m-p/508990#M1700</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8358"&gt;@Pankaj&lt;/a&gt;&amp;nbsp; Did you find any answers on the question you had raised here ?&amp;nbsp; our VAPT team raised the same concerns&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 19:44:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/m-p/508990#M1700</guid>
      <dc:creator>phpatel</dc:creator>
      <dc:date>2022-07-14T19:44:34Z</dc:date>
    </item>
  </channel>
</rss>

