<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall bypass due to Java/Python FTP Injections in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145705#M49081</link>
    <description>&lt;P&gt;content 667 was released:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Notes&lt;/STRONG&gt;: &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Palo Alto Networks has released a content update to add coverage for FTP Java/Python FTP Injection vulnerability as discussed in the security advisory [1]. Customers are advised to upgrade all devices to Content Apps and Threats Version 667-3876 or later and review policies to ensure desired actions are configured on all security policies. References [1] - &lt;A href="http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html" target="_blank"&gt;http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can find FIVE "Java/Python FTP Injection Vulnerability" vulnerability signatures in it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Mar 2017 05:16:51 GMT</pubDate>
    <dc:creator>emr_1</dc:creator>
    <dc:date>2017-03-02T05:16:51Z</dc:date>
    <item>
      <title>Firewall bypass due to Java/Python FTP Injections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145240#M49015</link>
      <description>&lt;P&gt;Hi. Reading the article below on firewall bypass I was wondering if Palo Alto Networks by default blocks active FTP connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html" target="_blank"&gt;http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That would mitigate the threat. Anyone an idea?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2017 09:47:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145240#M49015</guid>
      <dc:creator>LeonGubbelsInsign</dc:creator>
      <dc:date>2017-02-28T09:47:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall bypass due to Java/Python FTP Injections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145282#M49026</link>
      <description>&lt;P&gt;If you don't have a security policy that would allow FTP sessions into your network then it would be blocked, if you for some reason have any 'any any' rule from your trust to untrust then the session would be allowed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2017 13:40:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145282#M49026</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-02-28T13:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall bypass due to Java/Python FTP Injections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145704#M49080</link>
      <description>&lt;P&gt;Yes i understand about we can blocking with don't use allow FTP in security policy but if someone want to use policy ftp for allow FTP service to untrust or any zone. I think firewall should have a FTP Injections signature to protect this vulnerability.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2017 05:07:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145704#M49080</guid>
      <dc:creator>chinitsara</dc:creator>
      <dc:date>2017-03-02T05:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall bypass due to Java/Python FTP Injections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145705#M49081</link>
      <description>&lt;P&gt;content 667 was released:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Notes&lt;/STRONG&gt;: &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Palo Alto Networks has released a content update to add coverage for FTP Java/Python FTP Injection vulnerability as discussed in the security advisory [1]. Customers are advised to upgrade all devices to Content Apps and Threats Version 667-3876 or later and review policies to ensure desired actions are configured on all security policies. References [1] - &lt;A href="http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html" target="_blank"&gt;http://blog.blindspotsecurity.com/2017/02/advisory-javapython-ftp-injections.html&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I can find FIVE "Java/Python FTP Injection Vulnerability" vulnerability signatures in it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2017 05:16:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145705#M49081</guid>
      <dc:creator>emr_1</dc:creator>
      <dc:date>2017-03-02T05:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall bypass due to Java/Python FTP Injections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145730#M49084</link>
      <description>&lt;P&gt;I check in PANW Threat Vault has update &lt;EM&gt;Content Apps and Threats Version 667-3876&lt;/EM&gt; for&amp;nbsp;FTP Java/Python FTP Injection vulnerability already. Thank you for information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3-2-2017 1-46-35 PM.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7972i3A369C32A00E3715/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3-2-2017 1-46-35 PM.jpg" alt="3-2-2017 1-46-35 PM.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2017 06:51:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-bypass-due-to-java-python-ftp-injections/m-p/145730#M49084</guid>
      <dc:creator>chinitsara</dc:creator>
      <dc:date>2017-03-02T06:51:53Z</dc:date>
    </item>
  </channel>
</rss>

