<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vulnerabilities detected on https://appvpn.xxxx.xxx through our Bitsight in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerabilities-detected-on-https-appvpn-xxxx-xxx-through-our/m-p/1248433#M126012</link>
    <description>&lt;P&gt;Dear Team ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do we have any ETA for this enhancement related to CSP header ?&lt;/P&gt;</description>
    <pubDate>Wed, 18 Feb 2026 07:20:12 GMT</pubDate>
    <dc:creator>anupam_chauhan</dc:creator>
    <dc:date>2026-02-18T07:20:12Z</dc:date>
    <item>
      <title>vulnerabilities detected on https://appvpn.xxxx.xxx through our Bitsight</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerabilities-detected-on-https-appvpn-xxxx-xxx-through-our/m-p/589807#M117531</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;
&lt;P&gt;We use a cybersecurity tool called Bitsight in order to discover vulnerabilities in our organization. This time the tool has found out some in our &lt;A href="https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fappvpn.iese.edu%2F&amp;amp;data=05%7C02%7CServicedesk%40axians.es%7C77c9f30dd48c4cad57e508dc856a5981%7Ccae7d06108f340dd80c33c0b8889224a%7C0%7C0%7C638531939013545340%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;amp;sdata=c9iGBXsd4Dkf%2BATGqbvWyb8pHlSB8bnngE1%2FDyeIXOw%3D&amp;amp;reserved=0" target="_blank"&gt;https://appvpn.xxxx.xxx&lt;/A&gt; subdomain which is a web portal to download the GlobalProtect client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Alpalo_0-1718719318523.jpeg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/60395i89E9BB824D10B350/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Alpalo_0-1718719318523.jpeg" alt="Alpalo_0-1718719318523.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Bitsight finding in this case are related to the Content-Security-Policy header configuration. I send you some detail about this below. Do you have any experience with this? Could you provide us some information to solve this problem?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Content-Security-Policy (Potencially insecure policy)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: default-src&lt;/P&gt;
&lt;P&gt;Issue: No issue&lt;/P&gt;
&lt;P&gt;Remediation instructions: No remediation needed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: script-src&lt;/P&gt;
&lt;P&gt;Issue: “Unsafe-inline” is insecure&lt;/P&gt;
&lt;P&gt;Remediation instructions: Remove the "unsafe-inline" keyword from your content security policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: img-src&lt;/P&gt;
&lt;P&gt;Issue: Asterisks in the source are insecure&lt;/P&gt;
&lt;P&gt;Remediation instructions: Remove any instances of the asterisk character (*) that are by itself from your content security policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: style-src&lt;/P&gt;
&lt;P&gt;Issue: “Unsafe-inline” is insecure&lt;/P&gt;
&lt;P&gt;Remediation instructions: Remove the "unsafe-inline" keyword from your content security policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: reporting-objective&lt;/P&gt;
&lt;P&gt;Issue: No reporting directive in use&lt;/P&gt;
&lt;P&gt;Remediation instructions: Include a reporting directive with a valid location or group.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: form-action-objective&lt;/P&gt;
&lt;P&gt;Issue: Application privilege limitation (Form-Actions)&lt;/P&gt;
&lt;P&gt;Remediation instructions: Include the form-actions directive in your CSP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: code-injection-objective&lt;/P&gt;
&lt;P&gt;Issue: Limited code injection prevention&lt;/P&gt;
&lt;P&gt;Remediation instructions: Do not use any "unsafe" keywords and use explicit hosts for any source-list directives.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: Strict-Transport-Security&lt;/P&gt;
&lt;P&gt;Issue: No issue&lt;/P&gt;
&lt;P&gt;Remediation instructions: No remediation needed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Directive: X-Content-Type-Options&lt;/P&gt;
&lt;P&gt;Issue: No issue&lt;/P&gt;
&lt;P&gt;Remediation instructions: No remediation needed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;More information about this finding:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Issue: Potentially insecure policy&lt;/P&gt;
&lt;P&gt;Details: This Content-Security-Policy (CSP) has issues that possibly makes it insecure.&lt;/P&gt;
&lt;P&gt;Remediation Tip: Remove any instances of "unsafe-" directives and "blob, data, filesystem" sources. Ensure your CSP directives are correctly configured. Learn more at W3C CSP. &lt;A href="https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.w3.org%2FTR%2FCSP%2F&amp;amp;data=05%7C02%7CServicedesk%40axians.es%7C77c9f30dd48c4cad57e508dc856a5981%7Ccae7d06108f340dd80c33c0b8889224a%7C0%7C0%7C638531939013558442%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;amp;sdata=tk8b%2BkSCppb2jGIwz4FnK5p9mMNN%2Br6ZOsyA3nJXWkM%3D&amp;amp;reserved=0" target="_blank"&gt;https://www.w3.org/TR/CSP/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Issue: Ineffective headers: Content-Security-Policy&lt;/P&gt;
&lt;P&gt;Details: The implementation of these header(s) do not follow security best practices.&lt;/P&gt;
&lt;P&gt;Remediation Tip: Ensure your headers are implemented correctly, as outlined in RFC-7231 &lt;A href="https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftools.ietf.org%2Fhtml%2Frfc7231&amp;amp;data=05%7C02%7CServicedesk%40axians.es%7C77c9f30dd48c4cad57e508dc856a5981%7Ccae7d06108f340dd80c33c0b8889224a%7C0%7C0%7C638531939013568089%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;amp;sdata=H0DSbfvaSN5A1vwL0BK51U9dppW0ik5aaCggLXcZI6k%3D&amp;amp;reserved=0" target="_blank"&gt;https://tools.ietf.org/html/rfc7231&lt;/A&gt;. Your headers should not permit caching of encrypted content. They should also have specific permissions (as opposed to using wildcards or other generalizations) and be formatted properly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 14:04:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerabilities-detected-on-https-appvpn-xxxx-xxx-through-our/m-p/589807#M117531</guid>
      <dc:creator>Alpalo</dc:creator>
      <dc:date>2024-06-18T14:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerabilities detected on https://appvpn.xxxx.xxx through our Bitsight</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerabilities-detected-on-https-appvpn-xxxx-xxx-through-our/m-p/589965#M117559</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;These are suggested enhancements in the CSP header the directives (unsafe-inline set to self, frame-ancestors not available yet), which is not a vulnerability.&lt;/SPAN&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;SPAN&gt;The new HTML standard and the latest browsers now support the Content-Security-Policy config setting which is a stronger and recommended way of protection.&lt;/SPAN&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;SPAN&gt;X-FRAME-OPTIONS config setting (already set to DENY) is the old way of protecting Cross-Frame Scripting attacks. Frame-ancestors: none is equivalent to X-Frame-Options: DENY which already exists as a protection.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;SPAN&gt;You may verify the existence of X-Frame-options: DENY via curl :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;curl -v https://appvpn.xxx.xxx &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;

VERBOSE: GET with 0-byte payload
VERBOSE: received 170-byte response of content type text/html


StatusCode : 200
StatusDescription : OK
Content : &amp;lt;script LANGUAGE=JavaScript&amp;gt;
window.location="/global-protect/login.esp";
&amp;lt;/script&amp;gt;
&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;&amp;lt;/head&amp;gt;&amp;lt;body&amp;gt;&amp;lt;p&amp;gt;JavaScript must be enabled to continue!&amp;lt;/p&amp;gt;&amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;
RawContent : HTTP/1.1 200 OK
Connection: keep-alive
Pragma: private
X-FRAME-OPTIONS: DENY &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;
Strict-Transport-Security: max-age=31536000;
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Content...
Forms : {}
Headers : {[Connection, keep-alive], [Pragma, private], [X-FRAME-OPTIONS, DENY], [Strict-Transport-Security, max-age=31536000;]...}
Images : {}
InputFields : {}
Links : {}
ParsedHtml : System.__ComObject
RawContentLength : 170&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;SPAN&gt;Based on that, this one is an enhancement for best practice purposes and there's no configuration workaround as it takes actual source code change.&lt;/SPAN&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;BR style="box-sizing: border-box; color: #181818; font-family: -apple-system, 'system-ui', 'Segoe UI', Roboto, Helvetica, Arial, sans-serif, 'Apple Color Emoji', 'Segoe UI Emoji', 'Segoe UI Symbol'; font-size: 14px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; text-indent: 0px; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: #ffffff; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;" data-aura-rendered-by="258:49061;a" /&gt;&lt;SPAN&gt;Since it is a Firewall-based website, and there are limited options you can do on the Portal, the vulnerability is not a threat. There has not been a CVE so far that would require this fix.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That said,the enhancement is already planned to be included in future PAN-OS releases, however, there is no ETA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Kind regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-Kim.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jun 2024 07:52:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerabilities-detected-on-https-appvpn-xxxx-xxx-through-our/m-p/589965#M117559</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-06-20T07:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerabilities detected on https://appvpn.xxxx.xxx through our Bitsight</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vulnerabilities-detected-on-https-appvpn-xxxx-xxx-through-our/m-p/1248433#M126012</link>
      <description>&lt;P&gt;Dear Team ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do we have any ETA for this enhancement related to CSP header ?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Feb 2026 07:20:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vulnerabilities-detected-on-https-appvpn-xxxx-xxx-through-our/m-p/1248433#M126012</guid>
      <dc:creator>anupam_chauhan</dc:creator>
      <dc:date>2026-02-18T07:20:12Z</dc:date>
    </item>
  </channel>
</rss>

