CVE-2021-3055

Beschreibung:
An improper restriction of XML external entity (XXE) reference vulnerability in the Palo Alto Networks PAN-OS web interface enables an authenticated administrator to read any arbitrary file from the file system and send a specifically crafted request to the firewall that causes the service to crash. Repeated attempts to send this request result in denial of service to all PAN-OS services by restarting the device and putting it into maintenance mode. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.20; PAN-OS 9.0 versions earlier than PAN-OS 9.0.14; PAN-OS 9.1 versions earlier than PAN-OS 9.1.10; PAN-OS 10.0 versions earlier than PAN-OS 10.0.6. This issue does not affect Prisma Access.

CWE: CWE-611

CVSS-Bewertung
CVSS 2: HIGH – 7.5 (Version: 2.0)
CVSS 3: MEDIUM – 6.5 (Version: 3.1)

Links:

NVD – CVE-2021-3055
CVE – CVE-2021-3055

Link (max. 20) Quelle Tags
N/A CONFIRM Vendor Advisory Vendor Advisory Third Party Advisory Third Party Advisory
DSA-4968 DEBIAN Third Party Advisory Third Party Advisory
https://www.mail-archive.com/haproxy@formilux.org MISC Third Party Advisory Third Party Advisory Third Party Advisory
https://www.mail-archive.com/haproxy@formilux.org/msg41114.html MISC Mitigation Third Party Advisory
https://jfrog.com/blog/critical-vulnerability-in-haproxy-cve-2021-40346-integer-overflow-enables-http-smuggling/ MISC Exploit Mitigation Third Party Advisory
https://github.com/haproxy/haproxy/commit/3b69886f7dcc3cfb3d166309018e6cfec9ce2c95 MISC Patch Third Party Advisory
[cloudstack-dev] 20210910 CVE-2021-40346 (haproxy 2.x) MLIST Mailing List Third Party Advisory
[cloudstack-dev] 20210910 Re: CVE-2021-40346 (haproxy 2.x) MLIST Mailing List Third Party Advisory

Quelle: NVD – CVE-2021-3055
Datum Veröffentlichung: 2021-09-08T17:15Z, Datum letzte Änderung: 2021-09-15T19:04Z