Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2024-5914
HistoryAug 14, 2024 - 4:00 p.m.

Cortex XSOAR: Command Injection in CommonScripts Pack

2024-08-1416:00:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
6
cortex xsoar
command injection
palo alto networks
commonscripts pack
unauthenticated attacker
integration container
schedulegenericpolling
genericpollingscheduledtask
workaround
software

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/SC:H/VI:L/SI:H/VA:L/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

39.1%

A command injection issue in Palo Alto Networks Cortex XSOAR CommonScripts Pack allows an unauthenticated attacker to execute arbitrary commands within the context of an integration container.

Work around:
Remove any integration usage of the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS4

7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/SC:H/VI:L/SI:H/VA:L/SA:N/AU:N/U:Amber/R:U/V:D/RE:M

AI Score

7.9

Confidence

High

EPSS

0.001

Percentile

39.1%

Related for PA-CVE-2024-5914