The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the RADIUS server settings.
http://www.securityfocus.com/bid/107564
https://securityadvisories.paloaltonetworks.com/Home/Detail/142
Source: MITRE
Published: 2019-03-26
Updated: 2019-03-27
Type: CWE-79
Base Score: 3.5
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 6.8
Severity: LOW
Base Score: 4.8
Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Impact Score: 2.7
Exploitability Score: 1.7
Severity: MEDIUM
OR
cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:* versions up to 1.1.8 (inclusive)
ID | Name | Product | Family | Severity |
---|---|---|---|---|
135238 | Palo Alto Expedition Cross-Site Scripting | Nessus | Service detection | low |