I just stumbled on this security advisory while I was googling something totally unrelated...
"These issues have been fixed in PANOS 5.0.9, mentioned in the release notes like this:
57343—Fixed an issue that caused improper handling of imported certificates that contained HTML."
Also I think this vulnerability isn't even listed here, on PA's Security Advisories page:
This is the actual vulnerability:
A couple of bugs exist in Palo Alto Networks PANOS <= 5.0.8 which can be exploited to conduct cross-site scripting attacks.
Certificate fields are displayed in the firewall web interface without proper sanitization applied to them. This way it is possible to inject html into the web interface.
Various file upload forms used by the firewall do not implement proper CSRF protection. import.certificate.php for example. "
I also opened a TAC case for this, answer from there is that the information is not yet published in the security advisories because the fix for PANOS 4.1.x is not available until now.....discussible argumentation...
That's not an acceptable answer to me! When I can find the vulnerability on Palo Alto Networks PanOS 5.0.8 XSS / CSRF ≈ Packet Storm Packet Storm's site, it's out there for the public! At least let customers know there's a vulnerability
Just wanted to update that I got an explanation from PSIRT and even if I dont fully agree with them I do understand their point of view.
In short: an advisory will show up as soon as there is a fix available for all current PANOS versions.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!