This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote host is affected by a security bypass vulnerability.
The Palo Alto Networks PAN-OS running on the remote host is version
5.0.x, 6.0.x, 6.1.x, 7.0.x, or 7.1.x prior to 7.1.1. It is, therefore,
affected by a security bypass vulnerability in the URL filtering
mechanism, which is triggered when handling a specially crafted HTTP
header. An attacker can exploit this, via a specially crafted header,
to evade URL filtering, potentially allowing a violation of the
intended firewall rule base.
See also :
Upgrade to Palo Alto Networks PAN-OS version 7.1.1 or later, which
includes additional inspection for HTTP application identification and
URL categorization. Enforcement of this verification is enabled using
new threat signatures #14984 for HTTP and #14978 for TLS. Note that
PAN-OS must be upgraded to 7.1.1 in order for these new threat
signatures to be enabled.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.1
Public Exploit Available : true
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now