<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TCP 443 Web Server Allows Password Auto-Completion in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-443-web-server-allows-password-auto-completion/m-p/508348#M105849</link>
    <description>&lt;P&gt;Hello dear community, good afternoon:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please your support: I tell you about an "X" vendor vulnerability scan tool, I detect the following vuln against the IP of the MGT WEB-GUI of the Firewall.&lt;/P&gt;
&lt;P&gt;Problem,inconvenience, vulnerability against the WEB-GUI/MGT of the firewall directly:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Details:&lt;BR /&gt;Low TCP 443 Web Server Allows Password Auto-Completion:&lt;BR /&gt;The 'autocomplete' attribute is not disabled on password fields.&lt;BR /&gt;"The remote web server contains at least one HTML form field that has&lt;BR /&gt;an input of type 'password' where 'autocomplete' is not set to 'off'.&lt;BR /&gt;While this does not represent a risk to this web server per se, it&lt;BR /&gt;does mean that users who use the affected forms may have their&lt;BR /&gt;credentials saved in their browsers, which could in turn lead to a&lt;BR /&gt;Loss of confidentiality if any of them use a shared host or if their&lt;BR /&gt;machine is compromised at some point."&lt;/P&gt;
&lt;P&gt;"Page : /php/login.php&lt;BR /&gt;Destination Page: /php/login.php&lt;BR /&gt;"&lt;BR /&gt;******&lt;/P&gt;
&lt;P&gt;Does anyone know if this is correct or is it a false positive, and if correct, can someone tell me how to mitigate this vulnerability.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thank you, greetings and attentive to your comments.&lt;/P&gt;</description>
    <pubDate>Fri, 08 Jul 2022 17:22:12 GMT</pubDate>
    <dc:creator>Metgatz</dc:creator>
    <dc:date>2022-07-08T17:22:12Z</dc:date>
    <item>
      <title>TCP 443 Web Server Allows Password Auto-Completion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-443-web-server-allows-password-auto-completion/m-p/508348#M105849</link>
      <description>&lt;P&gt;Hello dear community, good afternoon:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please your support: I tell you about an "X" vendor vulnerability scan tool, I detect the following vuln against the IP of the MGT WEB-GUI of the Firewall.&lt;/P&gt;
&lt;P&gt;Problem,inconvenience, vulnerability against the WEB-GUI/MGT of the firewall directly:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Details:&lt;BR /&gt;Low TCP 443 Web Server Allows Password Auto-Completion:&lt;BR /&gt;The 'autocomplete' attribute is not disabled on password fields.&lt;BR /&gt;"The remote web server contains at least one HTML form field that has&lt;BR /&gt;an input of type 'password' where 'autocomplete' is not set to 'off'.&lt;BR /&gt;While this does not represent a risk to this web server per se, it&lt;BR /&gt;does mean that users who use the affected forms may have their&lt;BR /&gt;credentials saved in their browsers, which could in turn lead to a&lt;BR /&gt;Loss of confidentiality if any of them use a shared host or if their&lt;BR /&gt;machine is compromised at some point."&lt;/P&gt;
&lt;P&gt;"Page : /php/login.php&lt;BR /&gt;Destination Page: /php/login.php&lt;BR /&gt;"&lt;BR /&gt;******&lt;/P&gt;
&lt;P&gt;Does anyone know if this is correct or is it a false positive, and if correct, can someone tell me how to mitigate this vulnerability.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Thank you, greetings and attentive to your comments.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2022 17:22:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-443-web-server-allows-password-auto-completion/m-p/508348#M105849</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-07-08T17:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: TCP 443 Web Server Allows Password Auto-Completion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tcp-443-web-server-allows-password-auto-completion/m-p/508382#M105858</link>
      <description>&lt;P&gt;Well... it appears to be correct in so far as what it is testing for. Whether you really consider it a vulnerability is a matter of debate. The security concern would be the browser saving user credentials, but that is in the browser regardless what webpage you go to.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PaloAlto in v9.1 appears to use a different method to try and block saving credentials in the webcode:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&amp;lt;input type="password" style="display:none"&amp;gt; &amp;lt;!-- Work around to disable password autofill from browser --&amp;gt;&lt;BR /&gt;&amp;lt;input type="password" maxlength="120" size="19" id="passwd" name="passwd" onkeypress="checkCapsLock(event);"&amp;gt;&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Other versions might use a different method. You could try submitting a feature request to PaloAlto to use the autocomplete= attribute, instead of their current method, in future releases. Though searching around it appears that the autocomplete= attribute is ignored by some browsers.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jul 2022 22:05:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tcp-443-web-server-allows-password-auto-completion/m-p/508382#M105858</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-07-08T22:05:57Z</dc:date>
    </item>
  </channel>
</rss>

