A Cross-Site Scripting (XSS) vulnerability exists in the PAN-OS URL filtering “continue page” (Ref # PAN-OS 90835, CVE-2018-7636). PAN-OS software does not properly validate specific request parameters.
Successful exploitation of this issue may allow an attacker to inject arbitrary JavaScript or HTML in specially crafted URLs that link to a URL filtering “continue page” hosted by the firewall.
This issue affects PAN-OS major release PAN-OS 8.0 is affected (PAN-OS 8.0.10 and earlier). Other PAN-OS major releases are not affected (8.1.x, 7.1.x, 6.1.x).
Versions | Affected | Unaffected |
---|---|---|
PAN-OS 8.1 | None | 8.1.* |
PAN-OS 8.0 | <= 8.0.10 | >= 8.0.11-h4 |
PAN-OS 7.1 | None | 7.1.* |
PAN-OS 6.1 | None | 6.1.* |
CVSSv3.1 Base Score: 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
PAN-OS 8.0.11-h4 and later. PAN-OS major releases 8.1.x, 7.1.x, and 6.1.x are not impacted.
This issue impacts the continue page and admin override page, but does not impact the block page. URL filtering configurations that only use the “block” page but not the continue page or admin override feature are not impacted.