<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: High vulnerabilities PAN-OS reported by vulnerability management scan in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/high-vulnerabilities-pan-os-reported-by-vulnerability-management/m-p/513297#M1738</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would recommend you upgrade the code version.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Mon, 29 Aug 2022 19:28:24 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2022-08-29T19:28:24Z</dc:date>
    <item>
      <title>High vulnerabilities PAN-OS reported by vulnerability management scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/high-vulnerabilities-pan-os-reported-by-vulnerability-management/m-p/513065#M1734</link>
      <description>&lt;P&gt;Hello colleagues:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good afternoon, hope you are all well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some of you have reported these critical vulnerabilities to them, by Nesus Scan:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE width="3411"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="79.9583px" height="30px"&gt;Protocol&lt;/TD&gt;
&lt;TD width="40.3333px" height="30px"&gt;Port&lt;/TD&gt;
&lt;TD width="290.271px" height="30px"&gt;Name&lt;/TD&gt;
&lt;TD width="585.24px" height="30px"&gt;Synopsis&lt;/TD&gt;
&lt;TD width="1868.79px" height="30px"&gt;Description&lt;/TD&gt;
&lt;TD width="545.406px" height="30px"&gt;Solution&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="79.9583px" height="85px"&gt;TCP&lt;/TD&gt;
&lt;TD width="40.3333px" height="85px"&gt;443&lt;/TD&gt;
&lt;TD width="290.271px" height="85px"&gt;CGI Generic Command Execution (time-based)&lt;/TD&gt;
&lt;TD width="585.24px" height="85px"&gt;It may be possible to run arbitrary code on the remote web server.&lt;/TD&gt;
&lt;TD width="1868.79px" height="85px"&gt;The remote web server hosts CGI scripts that fail to adequately sanitize request strings.&amp;nbsp; By leveraging this issue, an attacker may be able to execute arbitrary commands on the remote host.&lt;BR /&gt;&lt;BR /&gt;Note that this script uses a time-based detection method which is less reliable than the basic method.&lt;/TD&gt;
&lt;TD width="545.406px" height="85px"&gt;Restrict access to the vulnerable application. Contact the vendor for a patch or upgrade.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="79.9583px" height="167px"&gt;TCP&lt;/TD&gt;
&lt;TD width="40.3333px" height="167px"&gt;443&lt;/TD&gt;
&lt;TD width="290.271px" height="167px"&gt;CGI Generic SQL Injection (blind, time based)&lt;/TD&gt;
&lt;TD width="585.24px" height="167px"&gt;A CGI application hosted on the remote web server is potentially prone to SQL injection attack.&lt;/TD&gt;
&lt;TD width="1868.79px" height="167px"&gt;By sending specially crafted parameters to one or more CGI scripts hosted on the remote web server, Nessus was able to get a slower response, which suggests that it may have been able to modify the behavior of the application and directly access the underlying database. &lt;BR /&gt;&lt;BR /&gt;An attacker may be able to exploit this issue to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system. &lt;BR /&gt;&lt;BR /&gt;Note that this script is experimental and may be prone to false positives.&lt;/TD&gt;
&lt;TD width="545.406px" height="167px"&gt;Modify the affected CGI scripts so that they properly escape arguments.&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you know if these two are false positives, if they can be mitigated with an adjustment or by performing an upgrade?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This was reported on PAN-OS 9.1.4 platform.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I remain attentive to your comments and suggestions&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2022 22:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/high-vulnerabilities-pan-os-reported-by-vulnerability-management/m-p/513065#M1734</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-08-25T22:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: High vulnerabilities PAN-OS reported by vulnerability management scan</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/high-vulnerabilities-pan-os-reported-by-vulnerability-management/m-p/513297#M1738</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would recommend you upgrade the code version.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304" target="_blank"&gt;https://live.paloaltonetworks.com/t5/customer-resources/support-pan-os-software-release-guidance/ta-p/258304&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 19:28:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/high-vulnerabilities-pan-os-reported-by-vulnerability-management/m-p/513297#M1738</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-08-29T19:28:24Z</dc:date>
    </item>
  </channel>
</rss>

