-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0038
  PAN-SA-2019-0001 Cross-Site Scripting in PAN-OS External Dynamic Lists
                              24 January 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              PAN-OS
Impact/Access:        Cross-site Scripting -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-1565  
Member content until: Saturday, February 23 2019

OVERVIEW

        PAN-OS External Dynamic Lists has been found to have a 
        cross-site scripting vulnerability in the following PAN-OS:
        
        o PAN-OS 7.1.21 and earlier
        o PAN-OS 8.0.14 and earlier
        o PAN-OS 8.1.5 and earlier [1]


IMPACT

        The vendor has provided the fooloeing details of the impact:
        
        "Severity: Medium
        
        Successful exploitation of this issue may allow an attacker that is
        authenticated in Next Generation Firewall with write privileges to 
        External Dynamic List configuration to inject arbitrary JavaScript 
        or HTML."[1]


MITIGATION

        The following updates have been made available to fix this exploit.
        
        o PAN-OS 7.1.22 and later 
        o PAN-OS 8.0.15 and later 
        o PAN-OS 8.1.6 and later
        
        Workarounds
        There are currently no workarounds.


REFERENCES

        [1] PAN-SA-2019-0001 Cross-Site Scripting in PAN-OS External Dynamic
            Lists
            https://securityadvisories.paloaltonetworks.com/Home/Detail/139

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=hwN3
-----END PGP SIGNATURE-----