Get supportSecurity advisories
Subscriptions
Report vulnerabilities
Palo Alto Networks Security Advisories / CVE-2019-1577

CVE-2019-1577 Code Injection Vulnerability in Traps


Severity 6.3 · MEDIUM
Attack Vector NETWORK
Attack Complexity LOW
Privileges Required LOW
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact LOW
Integrity Impact LOW
Availability Impact LOW
NVD JSON
Published: 2019-06-27
Updated: 2019-06-27
Ref#: PAN-SA-2019-0014

Description

Code injection vulnerability exists in the Palo Alto Networks Traps. (Ref: CVE-2019-1577)

Successful exploitation of this issue may allow an authenticated attacker to inject arbitrary JavaScript or HTML.

This issue affects Traps 5.0.5 and earlier, including all 4.x releases. These releases did not have the file protection (SPROT) enabled by default. Traps 5.0.6, 6.0 and later are NOT affected.

Product Status

Traps

VersionsAffectedUnaffected
5.0<= 5.0.5>= 5.0.6
4.04.*
6.0>= 6.0.*

Severity: MEDIUM

CVSSv3.1 Base Score: 6.3 ( CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L )

Solution

Traps 5.0.6 and later

Workarounds and Mitigations

Configure Agent Security options that prevent unauthorized access or tampering with Traps components. Instructions are located on (see step 6) https://docs.paloaltonetworks.com/traps/tms/traps-management-service-admin/manage-endpoint-policy/traps-profiles/add-agent-settings-profile

© 2020 Palo Alto Networks, Inc. All rights reserved.