Palo Alto Networks Security Advisories / CVE-2019-1583

CVE-2019-1583 Escalation of Privilege in Twistlock

047910
Severity 8 · HIGH
Attack Vector NETWORK
Attack Complexity LOW
Privileges Required LOW
User Interaction REQUIRED
Scope UNCHANGED
Confidentiality Impact HIGH
Integrity Impact HIGH
Availability Impact HIGH

Description

An HTML injection vulnerability has been identified in the Twistlock Console that can lead to a DOM based XSS attack under certain configurations. (Ref #, CVE-2019-1583)

Successful exploitation of this vulnerability allows a Twistlock user with Operator capabilities to escalate privileges to that of another user. Active interaction with an affected component is required for the payload to execute on the victim.

This issue affects Twistlock console 19.07.357 and earlier

Product Status

Twistlock Console

VersionsAffectedUnaffected
19.07<= 19.07.357>= 19.07.358

Severity: HIGH

CVSSv3.1 Base Score: 8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)

Weakness Type

CWE-264

Solution

Twistlock Console 19.07.358 and later

Workarounds and Mitigations

n/a

Acknowledgments

Palo Alto Networks would like to thank William Wirahasbianto for reporting this issue.
© 2020 Palo Alto Networks, Inc. All rights reserved.