Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-2036— PAN-OS: Reflected Cross-Site Scripting (XSS) vulnerability in management web interface

CVSS 8.8 · High EPSS 77.56% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-2036

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Reflected Cross-Site Scripting (XSS) vulnerability in management web interface
Source: NVD (National Vulnerability Database)
Vulnerability Description
A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS 存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。攻击者可利用该漏洞执行任意操作系统命令。以下是受影响的产品及版本:8.1到8.1.16版本;9.0到9.0.9版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksPAN-OS 9.0 ~ 9.0.9 -

II. Public POCs for CVE-2020-2036

#POC DescriptionSource LinkShenlong Link
1PAN-OS management web interface is vulnerable to reflected cross-site scripting. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-2036.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-2036

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2020-09-09 · 9 CVEs total

CVE-2020-20409.8 CRITICALPAN-OS: Buffer overflow when Captive Portal or Multi-Factor Authentication (MFA) is enable
CVE-2020-20417.5 HIGHPAN-OS: Management web interface denial-of-service (DoS)
CVE-2020-20377.2 HIGHPAN-OS: OS command injection vulnerability in the management web interface
CVE-2020-20387.2 HIGHPAN-OS: OS command injection vulnerability in the management web interface
CVE-2020-20427.2 HIGHPAN-OS: Buffer overflow in the management web interface
CVE-2020-20395.3 MEDIUMPAN-OS: Management web interface denial-of-service (DoS) through unauthenticated file uplo
CVE-2020-20433.3 LOWPAN-OS: Passwords may be logged in clear text when using after-change-detail custom syslog
CVE-2020-20443.3 LOWPAN-OS: Passwords may be logged in clear text while storing operational command (op comman

IV. Related Vulnerabilities

V. Comments for CVE-2020-2036

No comments yet


Leave a comment