2019-12-05 00:00:58 +00:00
{
"CVE_data_meta" : {
2020-05-13 10:23:24 -07:00
"ASSIGNER" : "psirt@paloaltonetworks.com" ,
"DATE_PUBLIC" : "2020-05-13T16:00:00.000Z" ,
2019-12-05 00:00:58 +00:00
"ID" : "CVE-2020-2001" ,
2020-05-13 10:23:24 -07:00
"STATE" : "PUBLIC" ,
"TITLE" : "PAN-OS: Panorama External control of file vulnerability leads to privilege escalation"
2019-12-05 00:00:58 +00:00
} ,
2020-05-13 10:23:24 -07:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "PAN-OS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "8.1" ,
"version_value" : "8.1.12"
} ,
{
"version_affected" : "<" ,
"version_name" : "9.0" ,
"version_value" : "9.0.6"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "8.1" ,
"version_value" : "8.1.12"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "9.0" ,
"version_value" : "9.0.6"
} ,
{
2020-05-13 13:17:02 -07:00
"version_affected" : "=" ,
2020-05-13 10:23:24 -07:00
"version_name" : "8.0" ,
2020-05-13 13:17:02 -07:00
"version_value" : "8.0.*"
2020-05-13 10:23:24 -07:00
} ,
{
"version_affected" : "=" ,
"version_name" : "7.1" ,
"version_value" : "7.1.*"
}
]
}
}
]
} ,
"vendor_name" : "Palo Alto Networks"
}
]
}
} ,
"credit" : [
{
"lang" : "eng" ,
"value" : "This issue was found by Ben Nott of Palo Alto Networks during internal security review."
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2019-12-05 00:00:58 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-05-14 16:01:27 +00:00
"value" : "An external control of path and data vulnerability in the Palo Alto Networks PAN-OS Panorama XSLT processing logic that allows an unauthenticated user with network access to PAN-OS management interface to write attacker supplied file on the system and elevate privileges. This issue affects: All PAN-OS 7.1 Panorama and 8.0 Panorama versions; PAN-OS 8.1 versions earlier than 8.1.12 on Panorama; PAN-OS 9.0 versions earlier than 9.0.6 on Panorama."
2019-12-05 00:00:58 +00:00
}
]
2020-05-13 10:23:24 -07:00
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "NONE" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-123 Write-what-where Condition"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2020-05-14 16:01:27 +00:00
"refsource" : "MISC" ,
"url" : "https://security.paloaltonetworks.com/CVE-2020-2001" ,
"name" : "https://security.paloaltonetworks.com/CVE-2020-2001"
2020-05-13 10:23:24 -07:00
}
]
} ,
"solution" : [
{
"lang" : "eng" ,
2020-05-13 13:17:02 -07:00
"value" : "This issue is fixed in PAN-OS 8.1.12, PAN-OS 9.0.6, and all later PAN-OS versions.\n\nPAN-OS 7.1 is on extended support until June 30, 2020, and is only being considered for critical security vulnerability fixes.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies."
2020-05-13 10:23:24 -07:00
}
] ,
"source" : {
"defect" : [
"PAN-120397"
] ,
"discovery" : "INTERNAL"
} ,
"timeline" : [
{
"lang" : "eng" ,
"time" : "2020-05-13T16:00:00.000Z" ,
"value" : "Initial publication"
}
]
2019-12-05 00:00:58 +00:00
}