#VU31451 Data Handling in Palo Alto PAN-OS


Published: 2016-11-19 | Updated: 2020-07-18

Vulnerability identifier: #VU31451

Vulnerability risk: Medium

CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-9149

CWE-ID: CWE-19

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Palo Alto PAN-OS
Operating systems & Components / Operating system

Vendor: Palo Alto Networks, Inc.

Description

The vulnerability allows a remote authenticated user to manipulate data.

The Addresses Object parser in Palo Alto Networks PAN-OS before 5.0.20, 5.1.x before 5.1.13, 6.0.x before 6.0.15, 6.1.x before 6.1.15, 7.0.x before 7.0.11, and 7.1.x before 7.1.6 mishandles single quote characters, which allows remote authenticated users to conduct XPath injection attacks via a crafted string.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Palo Alto PAN-OS: 7.1.0 - 7.1.5


External links
http://www.securityfocus.com/bid/94401
http://www.securitytracker.com/id/1037379
http://security.paloaltonetworks.com/CVE-2016-9149


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability