2019-12-05 00:00:58 +00:00
{
"CVE_data_meta" : {
2020-05-13 10:23:24 -07:00
"ASSIGNER" : "psirt@paloaltonetworks.com" ,
"DATE_PUBLIC" : "2020-05-13T16:00:00.000Z" ,
2019-12-05 00:00:58 +00:00
"ID" : "CVE-2020-2005" ,
2020-05-13 10:23:24 -07:00
"STATE" : "PUBLIC" ,
"TITLE" : "PAN-OS: GlobalProtect Clientless VPN session hijacking"
2019-12-05 00:00:58 +00:00
} ,
2020-05-13 10:23:24 -07:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "PAN-OS" ,
"version" : {
"version_data" : [
{
"version_affected" : "<" ,
"version_name" : "7.1" ,
"version_value" : "7.1.26"
} ,
{
"version_affected" : "<" ,
"version_name" : "8.1" ,
"version_value" : "8.1.13"
} ,
{
"version_affected" : "<" ,
"version_name" : "9.0" ,
"version_value" : "9.0.7"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "7.1" ,
"version_value" : "7.1.26"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "8.1" ,
"version_value" : "8.1.13"
} ,
{
"version_affected" : "!>=" ,
"version_name" : "9.0" ,
"version_value" : "9.0.7"
} ,
{
2020-05-13 13:17:02 -07:00
"version_affected" : "=" ,
2020-05-13 10:23:24 -07:00
"version_name" : "8.0" ,
2020-05-13 13:17:02 -07:00
"version_value" : "8.0.*"
2020-05-13 10:23:24 -07:00
}
]
}
}
]
} ,
"vendor_name" : "Palo Alto Networks"
}
]
}
} ,
"configuration" : [
{
"lang" : "eng" ,
"value" : "This issue only affects firewalls configured with GlobalProtect Clientless VPN."
}
] ,
"credit" : [
{
"lang" : "eng" ,
"value" : "This issue was discovered by Ron Masas of Palo Alto Networks during internal security review."
}
] ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2019-12-05 00:00:58 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-05-14 16:01:27 +00:00
"value" : "A cross-site scripting (XSS) vulnerability exists when visiting malicious websites with the Palo Alto Networks GlobalProtect Clientless VPN that can compromise the user's active session. This issue affects: PAN-OS 7.1 versions earlier than 7.1.26; PAN-OS 8.1 versions earlier than 8.1.13; PAN-OS 9.0 versions earlier than 9.0.7; All versions of PAN-OS 8.0."
2019-12-05 00:00:58 +00:00
}
]
2020-05-13 10:23:24 -07:00
} ,
"generator" : {
"engine" : "Vulnogram 0.0.9"
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "LOW" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 7.1 ,
"baseSeverity" : "HIGH" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "LOW" ,
"privilegesRequired" : "NONE" ,
"scope" : "UNCHANGED" ,
"userInteraction" : "REQUIRED" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2020-05-14 16:01:27 +00:00
"refsource" : "MISC" ,
"url" : "https://security.paloaltonetworks.com/CVE-2020-2005" ,
"name" : "https://security.paloaltonetworks.com/CVE-2020-2005"
2020-05-13 10:23:24 -07:00
}
]
} ,
"solution" : [
{
"lang" : "eng" ,
2020-05-13 13:17:02 -07:00
"value" : "This issue is fixed in PAN-OS 7.1.26, PAN-OS 8.1.13, PAN-OS 9.0.7, and all later versions of PAN-OS.\n\nPAN-OS 8.0 is now end-of-life as of October 31, 2019, and is no longer covered by our Product Security Assurance policies."
2020-05-13 10:23:24 -07:00
}
] ,
"source" : {
"defect" : [
"GPCON-551"
] ,
"discovery" : "INTERNAL"
} ,
"timeline" : [
{
"lang" : "eng" ,
"time" : "2020-05-13T16:00:00.000Z" ,
"value" : "Initial publication"
}
] ,
"work_around" : [
{
"lang" : "eng" ,
"value" : "Configure GlobalProtect Clientless VPN to only access known trusted websites, and block access all other websites."
}
]
2019-12-05 00:00:58 +00:00
}