CVE-2017-7217 Tampering of temporary export files in the Management Web Interface
Description
A vulnerability exists in the Management Web Interface that could allow an attacker to tamper with export files. The Management Web Interface does not properly validate specific request parameters which can potentially allow arbitrary data to be written to export files. (Ref # PAN- 70436 / CVE-2017-7217)
Successfully exploiting this issue would require an attacker to be authenticated. Tampering of files is limited to temporary files used for exporting
This issue affects PAN-OS 7.0.13 and earlier, PAN-OS 7.1.8 and earlier
Product Status
Versions | Affected | Unaffected |
---|---|---|
PAN-OS 7.1 | <= 7.1.8 | >= 7.1.9 |
PAN-OS 7.0 | <= 7.0.13 | >= 7.0.14 |
Severity: MEDIUM
CVSSv3.0 Base Score: 4.3 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
Weakness Type
CWE-20 Improper Input Validation
Solution
PAN-OS 7.0.14 and later, PAN-OS 7.1.9 and later
Workarounds and Mitigations
Palo Alto Networks recommends to implement best practice by allowing web interface access only to a dedicated management network. Additionally, restrict the set of IP addresses to a subset of authorized sources that you allow to interact with the management network