Get supportSecurity advisories
Subscriptions
Report vulnerabilities
Palo Alto Networks Security Advisories / CVE-2020-1977

CVE-2020-1977 Expedition Migration Tool: Insufficient Cross Site Request Forgery protection.


Severity 7.5 · HIGH
Attack Vector NETWORK
Attack Complexity HIGH
Privileges Required NONE
User Interaction REQUIRED
Scope UNCHANGED
Confidentiality Impact HIGH
Integrity Impact HIGH
Availability Impact HIGH
NVD JSON
Published: 2020-02-12
Updated: 2020-02-12
Ref#: MT-1593

Description

Insufficient Cross-Site Request Forgery (XSRF) protection on Expedition Migration Tool allows remote unauthenticated attackers to hijack the authentication of administrators and to perform actions on the Expedition Migration Tool.

Product Status

Expedition

VersionsAffectedUnaffected
1.1<= 1.1.51>= 1.1.52

Severity: HIGH

CVSSv3.1 Base Score: 7.5 ( CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H )

Solution

This issue is fixed in Expedition Migration Tool 1.1.52 and later versions.

Workarounds and Mitigations

To prevent the chance of malicious websites making forged requests to Expedition Migration Tool, you should access the tool exclusively from a web browser and log out after each use.

Acknowledgements

  • Palo Alto Networks thanks Jimi Sebree of Tenable Research for discovering and responsibly reporting this issue.
© 2020 Palo Alto Networks, Inc. All rights reserved.