08-12-2022 09:14 AM
Hello, our user want to deploy Palo Alto Firewall 3410 with Os 10.2.2, for security reason then they do the vulnerability assessment but using different device but with same OS 10.2.2.
And the result is that they found 2 vulnerabilityissues, low and information.
i took this VA is on the login page on palo alto firewall.
The Low vulnerabilityis about 'autocomplete' attribute is not disabled on password fields.
and the Information vulnerabilityis about robots.txt, that they recommed to limit that access to that file.
what i want to ask, is that possible to edit the html files for fix this low vulnerability?
is there any docs so i can fix this vulnerability?
08-16-2022 01:57 AM
Since i didn't find any docs about how to edit base html files on PanOS/mitigate this problem, so I just open ticket in support portal.
And they do the checking on html files.
the result for the low vulnerability is It seems false positive if the scanner is detecting it. The browsers can save the password regardless of the autocomplete ='off' and o be the scanners.
and for the information vulnerability with robot.txt is The contents of the robots.txt does not reveal any information about the secret path directories. This hints to disallow everything from the root '/', so no specific directories to allow or disallow.
08-15-2022 08:33 AM
Hello there.
The Live Community are volunteers and end users of the product, who come together to assist others.
I have not heard of any way to modify the "base" html files on the PANOS.
You would need to submit a feature request through your local PANW SE.
That is the correct process to follow.
08-16-2022 01:57 AM
Since i didn't find any docs about how to edit base html files on PanOS/mitigate this problem, so I just open ticket in support portal.
And they do the checking on html files.
the result for the low vulnerability is It seems false positive if the scanner is detecting it. The browsers can save the password regardless of the autocomplete ='off' and o be the scanners.
and for the information vulnerability with robot.txt is The contents of the robots.txt does not reveal any information about the secret path directories. This hints to disallow everything from the root '/', so no specific directories to allow or disallow.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!