Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Palo Alto Expedition Migration Tool 1.1.8 and earlier - Multiple XSS

Low

Synopsis

Palo Alto Expedition Migration tool is vulnerable to multiple XSS attacks.



The "Account Name" field when adding new users is vulnerable to a stored XSS attack.

 

To reproduce:

1. Login to expedition management interface using admin credentials. 2. Go to the SETTINGS tab on the top level

3. Click on USERS

4. Add new users -- > Click on ‘+’ sign on top right

5. Add below details:

- Account name: <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> - First name

- Last name

- Select any time zone

- Select any role

- Type password

- Select Authentication Server - Save the details

 

The configuration input items in the LDAP Server settings are vulnerable to stored XSS attacks.

 

To reproduce:

1. Login to expedition management interface using admin credentials. 2. Go to the SETTINGS tab on the top level

3. Click on the SERVERS

4. Click on ‘+’ (Add new server) sign on top right from LDAP section

5. Add below details to ADD NEW LDAP SERVER:

- Select Active (Even if you don’t select it is fine)

- Name: <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>

- Address: <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME> - Prefix: <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>

- Suffix: <IFRAME SRC=# onmouseover="alert(document.cookie)"></IFRAME>

- Port: 389

- Search Dn:

- Crypto: None

6. Save the details.

 

The configuration input items in the RADIUS Server settings are vulnerable to stored XSS attacks.

 

To reproduce:

1. Login to expedition management interface using admin credentials. 2. Go to the SETTINGS tab on the top level

3. Click on the SERVERS

4. Click on ‘+’ (Add new server) sign on top right from RADIUS section 5. Add below details to ADD NEW LDAP SERVER:

- Select Active (Even if you don’t select it is fine)

- Name: <IFRAME SRC="javascript:alert('XSS');"></IFRAME>

- Address: <IFRAME SRC="javascript:alert('XSS');"></IFRAME> - Port: <IFRAME SRC="javascript:alert('XSS');"></IFRAME>

- Shared Key: None

6. Save the details.

 

A reflected XSS vulnerability exists in the RADIUS Server settings page.

 

To reproduce:

1. Login to expedition management interface. 2. Go to the SETTINGS tab on the top level

3. Click on the SERVERS

4. Click on ‘+’ (Add new server) sign on top right from RADIUS section 5. Add below details to ADD NEW LDAP SERVER:

- Select Active (Even if you don’t select it is fine)

- Name: <IFRAME SRC="javascript:alert('alpha');"></IFRAME> - Address: <IFRAME SRC="javascript:alert('beta');"></IFRAME> - Port: <IFRAME SRC="javascript:alert('gamma');"></IFRAME> - Shared Key: <any>

6. Save the details.




Solution

Update to version 1.1.9 or later.

Additional References

Disclosure Timeline

03/04/2019 - Informed Palo Alto. 90 days is June 3, 2019.
03/05/2019 - Palo Alto acknowledges report.
03/07/2019 - Palo Alto informs Tenable of fix information and CVE assignments.
03/12/2019 - Palo Alto releases advisory.

All information within TRA advisories is provided “as is”, without warranty of any kind, including the implied warranties of merchantability and fitness for a particular purpose, and with no guarantee of completeness, accuracy, or timeliness. Individuals and organizations are responsible for assessing the impact of any actual or potential security vulnerability.

Tenable takes product security very seriously. If you believe you have found a vulnerability in one of our products, we ask that you please work with us to quickly resolve it in order to protect customers. Tenable believes in responding quickly to such reports, maintaining communication with researchers, and providing a solution in short order.

For more details on submitting vulnerability information, please see our Vulnerability Reporting Guidelines page.

If you have questions or corrections about this advisory, please email [email protected]

Risk Information

Tenable Advisory ID: TRA-2019-13
Credit:
Sayali Kukarni of Tenable Research
CVSSv2 Base / Temporal Score:
3.6 / 3.0
CVSSv2 Vector:
AV:N/AC:H/Au:S/C:P/I:P/A:N/
Affected Products:
Palo Alto Expedition Migration Tool 1.1.8 and earlier
Risk Factor:
Low

Advisory Timeline

03/22/2019 - Initial release.