<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Missing Secure Flag on the SSL Cookie after a vulnerability assessment ran  on PA820 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462768#M102299</link>
    <description>&lt;P&gt;The cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rapidfs.run/" target="_self"&gt;rapidfs&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Feb 2022 04:20:00 GMT</pubDate>
    <dc:creator>Jacobsaq</dc:creator>
    <dc:date>2022-02-04T04:20:00Z</dc:date>
    <item>
      <title>Missing Secure Flag on the SSL Cookie after a vulnerability assessment ran  on PA820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/384946#M90093</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;In my case, the team is performing a vulnerability assessment on PA820&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Vulnerability Title:&amp;nbsp;&lt;/STRONG&gt;&lt;/FONT&gt;Missing Secure Flag From SSL Cookie&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;&lt;STRONG&gt;Description:&lt;/STRONG&gt;&lt;SPAN&gt; The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS. This will help protect the cookie from being passed over unencrypted requests. If the application can be accessed over both HTTP and HTTPS, then there is the potential that the cookie can be sent in cleartext.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="3"&gt;The scanning was running to the MGMT IP,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How to find out the Missing Secure Flag on the SSL Cookie&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 06:53:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/384946#M90093</guid>
      <dc:creator>Mohammed_Yasin</dc:creator>
      <dc:date>2021-02-10T06:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Secure Flag on the SSL Cookie after a vulnerability assessment ran  on PA820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/385027#M90098</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/td-p/374153" target="_blank"&gt;https://live.paloaltonetworks.com/t5/threat-vulnerability-discussions/check-and-help-resolving-vapt-reported-issues-global-protect-ssl/td-p/374153&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd recommend reaching out to support with the findings of your vulnerability assessment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Wed, 10 Feb 2021 10:25:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/385027#M90098</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2021-02-10T10:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Secure Flag on the SSL Cookie after a vulnerability assessment ran  on PA820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462748#M102296</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131110"&gt;@Mohammed_Yasin&lt;/a&gt; - Have you got any updates about this vulnerability. If yes, can you pls share?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 10:33:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462748#M102296</guid>
      <dc:creator>ManojV5</dc:creator>
      <dc:date>2022-02-02T10:33:24Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Secure Flag on the SSL Cookie after a vulnerability assessment ran  on PA820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462768#M102299</link>
      <description>&lt;P&gt;The cookie will be transmitted in clear-text if the user visits any HTTP URLs within the cookie's scope.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.rapidfs.run/" target="_self"&gt;rapidfs&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Feb 2022 04:20:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462768#M102299</guid>
      <dc:creator>Jacobsaq</dc:creator>
      <dc:date>2022-02-04T04:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Secure Flag on the SSL Cookie after a vulnerability assessment ran  on PA820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462799#M102302</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/185581"&gt;@ManojV5&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could be a false positive as the secure flag is set when I check on my lab (PA-VM running 9.1 and 10.1) ... unfortunately I don't have a PA-820 to test but you can easily verify yourself with the command:&lt;/P&gt;
&lt;P class="p1" data-unlink="true"&gt;&lt;EM&gt;&lt;SPAN class="s1"&gt;$ curl -k -i https://&amp;lt;yourIP&amp;gt;&amp;nbsp;/php/login.php&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Feel free to run the same command on your device and check the response (notice the secure flag is set in &lt;STRONG&gt;Set-Cookie&lt;/STRONG&gt; in both my responses):&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;AMSMAC60KYG8WL:~ kwens$ curl -k -i https://192.168.0.207/php/login.php &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; PAN-OS 9.1
HTTP/1.1 200 OK
Date: Wed, 02 Feb 2022 12:46:56 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-FRAME-OPTIONS: DENY
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; img-src 'self' data:;
Strict-Transport-Security: max-age=31536000
Set-Cookie: PHPSESSID=95a09564ecf30d16912f68458c038b57; path=/; HttpOnly; SameSite=Strict; secure; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Allow: GET, HEAD, POST, PUT, DELETE, OPTIONS


AMSMAC60KYG8WL:~ kwens$ curl -k -i https://192.168.0.75/php/login.php &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; PAN-OS 10.1
HTTP/1.1 200 OK
Date: Wed, 02 Feb 2022 12:41:03 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-FRAME-OPTIONS: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Content-Security-Policy: default-src 'self'; script-src 'self' 'unsafe-eval' 'unsafe-inline'; style-src 'self' 'unsafe-inline'; img-src 'self' data:
Strict-Transport-Security: max-age=31536000
Set-Cookie: PHPSESSID=5420dde555d4512fd0ba4a4129b57581; path=/; HttpOnly; SameSite=Strict; secure; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Allow: GET, HEAD, POST, PUT, DELETE, OPTIONS
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unless they are checking for something else it seems to me that the secure flag is set correctly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Feb 2022 12:59:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462799#M102302</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-02-02T12:59:36Z</dc:date>
    </item>
    <item>
      <title>Re: Missing Secure Flag on the SSL Cookie after a vulnerability assessment ran  on PA820</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462952#M102314</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11943"&gt;@kiwi&lt;/a&gt; - Thanks, I will be checking it.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Feb 2022 04:06:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/missing-secure-flag-on-the-ssl-cookie-after-a-vulnerability/m-p/462952#M102314</guid>
      <dc:creator>ManojV5</dc:creator>
      <dc:date>2022-02-03T04:06:30Z</dc:date>
    </item>
  </channel>
</rss>

