Vulnerability Details : CVE-2017-15943
The configuration file import for applications, spyware and vulnerability objects functionality in the web interface in Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, and 7.1.x before 7.1.14 allows remote attackers to conduct server-side request forgery (SSRF) attacks and consequently obtain sensitive information via vectors related to parsing of external entities.
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2017-15943
- cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
- cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-15943
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-15943
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2017-15943
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-15943
-
http://www.securityfocus.com/bid/102074
Palo Alto Networks PAN-OS CVE-2017-15943 Server Side Request Forgery Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://security.paloaltonetworks.com/CVE-2017-15943
CVE-2017-15943 Server-Side Request Forgery in PAN-OS
-
http://www.securitytracker.com/id/1040005
Palo Alto PAN-OS Access Control Flaw Lets Remote Users Conduct Server-Side Request Forgery Attacks - SecurityTrackerThird Party Advisory;VDB Entry
Jump to