Vigil@nce - PAN-OS: bypassing url filtering
June 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can add an HTTP header for PAN-OS, in order to bypass
the url filtering.
Impacted products: PAN-OS.
Severity: 2/4.
Creation date: 19/04/2016.
DESCRIPTION OF THE VULNERABILITY
The PAN-OS product offers a service to filter urls on the Palo
Alto firewall.
However, by adding an HTTP header, this filtering is bypassed.
An attacker can therefore add an HTTP header for PAN-OS, in order
to bypass the url filtering.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/PAN-OS-bypassing-url-filtering-19411