<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Web Application Potentially Sensitive CGI Parameter Detection in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/web-application-potentially-sensitive-cgi-parameter-detection/m-p/572844#M2078</link>
    <description>&lt;P&gt;Need to check any advisory released by Palo Alto on the above mentioned Vulnerability and make sure that it does not leak any confidential information, or sensitive data will not be disclosed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Description:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;According to their names, some CGI parameters may control sensitive data (e.g., ID, privileges, commands, prices, credit card data, etc.). In the course of using an application, these variables may disclose sensitive data or be prone to tampering that could result in privilege escalation. These parameters should be examined to determine what type of data is controlled and if it poses a security risk.&lt;/SPAN&gt;&lt;BR /&gt;---------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;VA Scan Output:&lt;/P&gt;
&lt;P&gt;Name:Web Application Potentially Sensitive CGI Parameter Detection&lt;/P&gt;
&lt;P&gt;Port:443&lt;/P&gt;
&lt;P&gt;Sypnosis:&lt;/P&gt;
&lt;P&gt;An application was found that may use CGI parameters to control sensitive information.&lt;/P&gt;
&lt;P&gt;Description:&lt;/P&gt;
&lt;P&gt;"According to their names, some CGI parameters may control sensitive&lt;/P&gt;
&lt;P&gt;data (e.g., ID, privileges, commands, prices, credit card data, etc.).&lt;/P&gt;
&lt;P&gt;In the course of using an application, these variables may disclose&lt;/P&gt;
&lt;P&gt;sensitive data or be prone to tampering that could result in privilege&lt;/P&gt;
&lt;P&gt;escalation.&amp;nbsp; These parameters should be examined to determine what&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;type of data is controlled and if it poses a security risk.&lt;/P&gt;
&lt;P&gt;** This plugin only reports information that may be useful for auditors&lt;/P&gt;
&lt;P&gt;** or pen-testers, not a real flaw."&lt;/P&gt;
&lt;P&gt;Solution:&lt;/P&gt;
&lt;P&gt;Ensure sensitive data is not disclosed by CGI parameters.&amp;nbsp; In&lt;/P&gt;
&lt;P&gt;addition, do not use CGI parameters to control access to resources or&lt;/P&gt;
&lt;P&gt;privileges.&lt;/P&gt;
&lt;P&gt;Plugin Output:&lt;/P&gt;
&lt;P&gt;Potentially sensitive parameters for CGI /php/login.php :&lt;/P&gt;
&lt;P&gt;user : Potential horizontal privilege escalation - try another user ID&lt;/P&gt;
&lt;P&gt;passwd : Possibly a clear or hashed password, vulnerable to dictionary attack&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;No information about this vulnerability on Threat Vault and Security advisories in Palo Alto.&lt;BR /&gt;&lt;BR /&gt;Relevant Information and articles:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Tenable:&amp;nbsp;&lt;A href="https://www.tenable.com/plugins/nessus/40773" target="_blank"&gt;https://www.tenable.com/plugins/nessus/40773&lt;/A&gt;.&lt;BR /&gt;2. Live Community article:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/high-vulnerabilities-pan-os-reported-by-vulnerability-management/td-p/513065" target="_blank"&gt;https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/high-vulnerabilities-pan-os-reported-by-vulnerability-management/td-p/513065&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Please suggest any mitigation steps given by Palo Alto or is there any other recommendations given by PaloAlto on this.&lt;/P&gt;
&lt;P&gt;Any PAN-OS versions where this is addressed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jan 2024 08:44:46 GMT</pubDate>
    <dc:creator>Purushotham</dc:creator>
    <dc:date>2024-01-12T08:44:46Z</dc:date>
    <item>
      <title>Web Application Potentially Sensitive CGI Parameter Detection</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/web-application-potentially-sensitive-cgi-parameter-detection/m-p/572844#M2078</link>
      <description>&lt;P&gt;Need to check any advisory released by Palo Alto on the above mentioned Vulnerability and make sure that it does not leak any confidential information, or sensitive data will not be disclosed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Description:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;According to their names, some CGI parameters may control sensitive data (e.g., ID, privileges, commands, prices, credit card data, etc.). In the course of using an application, these variables may disclose sensitive data or be prone to tampering that could result in privilege escalation. These parameters should be examined to determine what type of data is controlled and if it poses a security risk.&lt;/SPAN&gt;&lt;BR /&gt;---------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;VA Scan Output:&lt;/P&gt;
&lt;P&gt;Name:Web Application Potentially Sensitive CGI Parameter Detection&lt;/P&gt;
&lt;P&gt;Port:443&lt;/P&gt;
&lt;P&gt;Sypnosis:&lt;/P&gt;
&lt;P&gt;An application was found that may use CGI parameters to control sensitive information.&lt;/P&gt;
&lt;P&gt;Description:&lt;/P&gt;
&lt;P&gt;"According to their names, some CGI parameters may control sensitive&lt;/P&gt;
&lt;P&gt;data (e.g., ID, privileges, commands, prices, credit card data, etc.).&lt;/P&gt;
&lt;P&gt;In the course of using an application, these variables may disclose&lt;/P&gt;
&lt;P&gt;sensitive data or be prone to tampering that could result in privilege&lt;/P&gt;
&lt;P&gt;escalation.&amp;nbsp; These parameters should be examined to determine what&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;type of data is controlled and if it poses a security risk.&lt;/P&gt;
&lt;P&gt;** This plugin only reports information that may be useful for auditors&lt;/P&gt;
&lt;P&gt;** or pen-testers, not a real flaw."&lt;/P&gt;
&lt;P&gt;Solution:&lt;/P&gt;
&lt;P&gt;Ensure sensitive data is not disclosed by CGI parameters.&amp;nbsp; In&lt;/P&gt;
&lt;P&gt;addition, do not use CGI parameters to control access to resources or&lt;/P&gt;
&lt;P&gt;privileges.&lt;/P&gt;
&lt;P&gt;Plugin Output:&lt;/P&gt;
&lt;P&gt;Potentially sensitive parameters for CGI /php/login.php :&lt;/P&gt;
&lt;P&gt;user : Potential horizontal privilege escalation - try another user ID&lt;/P&gt;
&lt;P&gt;passwd : Possibly a clear or hashed password, vulnerable to dictionary attack&lt;/P&gt;
&lt;P&gt;-----------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;No information about this vulnerability on Threat Vault and Security advisories in Palo Alto.&lt;BR /&gt;&lt;BR /&gt;Relevant Information and articles:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Tenable:&amp;nbsp;&lt;A href="https://www.tenable.com/plugins/nessus/40773" target="_blank"&gt;https://www.tenable.com/plugins/nessus/40773&lt;/A&gt;.&lt;BR /&gt;2. Live Community article:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/high-vulnerabilities-pan-os-reported-by-vulnerability-management/td-p/513065" target="_blank"&gt;https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/high-vulnerabilities-pan-os-reported-by-vulnerability-management/td-p/513065&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Please suggest any mitigation steps given by Palo Alto or is there any other recommendations given by PaloAlto on this.&lt;/P&gt;
&lt;P&gt;Any PAN-OS versions where this is addressed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 08:44:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/web-application-potentially-sensitive-cgi-parameter-detection/m-p/572844#M2078</guid>
      <dc:creator>Purushotham</dc:creator>
      <dc:date>2024-01-12T08:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Web Application Potentially Sensitive CGI Parameter Detection</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/web-application-potentially-sensitive-cgi-parameter-detection/m-p/577616#M2094</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Opened ticket with PA TAC and got the response as below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Web Application Potentially Sensitive CGI Parameter Detection. This is an information only and not an actual vulnerability. If there's any specific exploit/vulnerability, please share the PoC (Proof-of-Concept) as well as the CVE tracking number.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.tenable.com/plugins/nessus/40773" target="_blank" rel="noopener"&gt;https://www.tenable.com/plugins/nessus/40773&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;"This plugin only reports information that may be useful for auditors or pen-testers, not a real flaw. No action required since it is not an actual vulnerability but information only."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2024 05:16:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/web-application-potentially-sensitive-cgi-parameter-detection/m-p/577616#M2094</guid>
      <dc:creator>Purushotham</dc:creator>
      <dc:date>2024-02-19T05:16:28Z</dc:date>
    </item>
  </channel>
</rss>

