Palo Alto Networks PAN-OS HTTP Header Handling URL Filter Bypass (PAN-SA-2016-0006)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote host is affected by a security bypass vulnerability.

Description :

The Palo Alto Networks PAN-OS running on the remote host is version
5.0.x, 6.0.x, 6.1.x, 7.0.x, or 7.1.x prior to 7.1.1. It is, therefore,
affected by a security bypass vulnerability in the URL filtering
mechanism, which is triggered when handling a specially crafted HTTP
header. An attacker can exploit this, via a specially crafted header,
to evade URL filtering, potentially allowing a violation of the
intended firewall rule base.

See also :

https://securityadvisories.paloaltonetworks.com/Home/Detail/39

Solution :

Upgrade to Palo Alto Networks PAN-OS version 7.1.1 or later, which
includes additional inspection for HTTP application identification and
URL categorization. Enforcement of this verification is enabled using
new threat signatures #14984 for HTTP and #14978 for TLS. Note that
PAN-OS must be upgraded to 7.1.1 in order for these new threat
signatures to be enabled.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Palo Alto Local Security Checks

Nessus Plugin ID: 90775 ()

Bugtraq ID:

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now