Lucene search

K
nessusThis script is Copyright (C) 2017-2018 Tenable Network Security, Inc.PALO_ALTO_PAN-SA-2017-0010.NASL
HistoryApr 18, 2017 - 12:00 a.m.

Palo Alto Networks PAN-OS 7.0.x < 7.0.14 / 7.1.x < 7.1.9 Multiple Vulnerabilities (PAN-SA-2017-0008 - PAN-SA-2017-0010)

2017-04-1800:00:00
This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.
www.tenable.com
41

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.0%

The version of Palo Alto Networks PAN-OS running on the remote host is 7.0.x prior to 7.0.14 or 7.1.x prior to 7.1.9. It is, therefore, affected by multiple vulnerabilities :

  • A flaw exists in the Management Web Interface due to improper validation of certain request parameters. An authenticated, remote attacker can exploit this to disclose potentially sensitive information. Note that this vulnerability only affects the 7.1.x version.
    (CVE-2017-7126)

  • A flaw exists in the Management Web Interface due to improper validation of certain request parameters. An authenticated, remote attacker can exploit this to write arbitrary data to export files. (CVE-2017-7217)

  • A flaw exists in the Management Web Interface due to improper validation of certain request parameters. A local attacker can exploit this to execute arbitrary code with elevated privileges. Note that this vulnerability only affects the 7.1.x version.
    (CVE-2017-7218)

#
# (C) Tenable Network Security, Inc.
#

if (!defined_func("nasl_level") || nasl_level() < 6000) exit(0, "Nessus older than 6.0.x");

include("compat.inc");

if (description)
{
  script_id(99438);
  script_version("1.3");
  script_cvs_date("Date: 2018/07/24 18:56:13");

  script_cve_id(
    "CVE-2017-7126",
    "CVE-2017-7217",
    "CVE-2017-7218"
  );
  script_bugtraq_id(
    97590,
    97592,
    97598
  );

  script_name(english:"Palo Alto Networks PAN-OS 7.0.x < 7.0.14 / 7.1.x < 7.1.9 Multiple Vulnerabilities (PAN-SA-2017-0008 - PAN-SA-2017-0010)");
  script_summary(english:"Checks the PAN-OS version.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description",value:
"The version of Palo Alto Networks PAN-OS running on the remote host is
7.0.x prior to 7.0.14 or 7.1.x prior to 7.1.9. It is, therefore,
affected by multiple vulnerabilities :

  - A flaw exists in the Management Web Interface due to
    improper validation of certain request parameters. An
    authenticated, remote attacker can exploit this to
    disclose potentially sensitive information. Note that
    this vulnerability only affects the 7.1.x version.
    (CVE-2017-7126)

  - A flaw exists in the Management Web Interface due to
    improper validation of certain request parameters. An
    authenticated, remote attacker can exploit this to
    write arbitrary data to export files. (CVE-2017-7217)

  - A flaw exists in the Management Web Interface due to
    improper validation of certain request parameters. A
    local attacker can exploit this to execute arbitrary
    code with elevated privileges. Note that this
    vulnerability only affects the 7.1.x version.
    (CVE-2017-7218)");
  script_set_attribute(attribute:"see_also", value:"https://securityadvisories.paloaltonetworks.com/Home/Detail/78");
  script_set_attribute(attribute:"see_also", value:"https://securityadvisories.paloaltonetworks.com/Home/Detail/79");
  script_set_attribute(attribute:"see_also", value:"https://securityadvisories.paloaltonetworks.com/Home/Detail/80");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Palo Alto Networks PAN-OS version 7.0.14 / 7.1.9 or later.

As a workaround or mitigation, Palo Alto Networks recommends allowing
web interface access only to a dedicated management network.
Additionally, restrict the set of IP addresses to a subset of
authorized sources that you allow to interact with the management
network.");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/04/10");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/04/10");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/04/18");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:paloaltonetworks:pan-os");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Palo Alto Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2017-2018 Tenable Network Security, Inc.");

  script_dependencies("palo_alto_version.nbin");
  script_require_keys("Host/Palo_Alto/Firewall/Version", "Host/Palo_Alto/Firewall/Full_Version");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

app_name = "Palo Alto Networks PAN-OS";
version = get_kb_item_or_exit("Host/Palo_Alto/Firewall/Version");
full_version = get_kb_item_or_exit("Host/Palo_Alto/Firewall/Full_Version");
fix = NULL;

# Ensure sufficient granularity.
if (version !~ "^\d+\.\d+\.\d+") audit(AUDIT_VER_NOT_GRANULAR, app_name, full_version);

switch[=~] (version)
{
  case "^7\.0\.([0-9]|1[0-3])($|[^0-9])":
    fix = "7.0.14";
    break;
  case "^7\.1\.[0-8]($|[^0-9])":
    fix = "7.1.9";
    break;
  default:
    audit(AUDIT_INST_VER_NOT_VULN, app_name, full_version);
}

report =
  '\n  Installed version : ' + full_version +
  '\n  Fixed version     : ' + fix +
  '\n';
security_report_v4(severity:SECURITY_HOLE, extra:report, port:0);

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.0%

Related for PALO_ALTO_PAN-SA-2017-0010.NASL