Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-0011— PAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering

CVSS 6.5 · Medium EPSS 0.30% · P54
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-0011

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: URL Category Exceptions Match More URLs Than Intended in URL Filtering
Source: NVD (National Vulnerability Database)
Vulnerability Description
PAN-OS software provides options to exclude specific websites from URL category enforcement and those websites are blocked or allowed (depending on your rules) regardless of their associated URL category. This is done by creating a custom URL category list or by using an external dynamic list (EDL) in a URL Filtering profile. When the entries in these lists have a hostname pattern that does not end with a forward slash (/) or a hostname pattern that ends with an asterisk (*), any URL that starts with the specified pattern is considered a match. Entries with a caret (^) at the end of a hostname pattern match any top level domain. This may inadvertently allow or block more URLs than intended and allowing more URLs than intended represents a security risk. For example: example.com will match example.com.website.test example.com.* will match example.com.website.test example.com.^ will match example.com.test You should take special care when using such entries in policy rules that allow traffic. Where possible, use the exact list of hostname names ending with a forward slash (/) instead of using wildcards. PAN-OS 10.1 versions earlier than PAN-OS 10.1.3; PAN-OS 10.0 versions earlier than PAN-OS 10.0.8; PAN-OS 9.1 versions earlier than PAN-OS 9.1.12; all PAN-OS 9.0 versions; PAN-OS 8.1 versions earlier than PAN-OS 8.1.21, and Prisma Access 2.2 and 2.1 versions do not allow customers to change this behavior without changing the URL category list or EDL.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
解释冲突
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS software 存在安全漏洞,该漏洞可能会无意中允许或阻止比预期更多的 URL,并且允许比预期更多的 URL 会带来安全风险。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksPAN-OS 9.0.* -
Palo Alto NetworksPrisma Access 3.0 Preferred, Innovation -

II. Public POCs for CVE-2022-0011

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-0011

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2022-02-10 · 7 CVEs total

CVE-2022-00167.4 HIGHGlobalProtect App: Privilege Escalation Vulnerability When Using Connect Before Logon
CVE-2022-00177.0 HIGHGlobalProtect App: Improper Link Resolution Vulnerability Leads to Local Privilege Escalat
CVE-2022-00206.8 MEDIUMCortex XSOAR: Stored Cross-Site Scripting (XSS) Vulnerability in Web Interface
CVE-2022-00186.1 MEDIUMGlobalProtect App: Information Exposure Vulnerability When Connecting to GlobalProtect Por
CVE-2022-00194.7 MEDIUMGlobalProtect App: Insufficiently Protected Credentials Vulnerability on Linux
CVE-2022-00213.3 LOWGlobalProtect App: Information Exposure Vulnerability When Using Connect Before Logon

IV. Related Vulnerabilities

V. Comments for CVE-2022-0011

No comments yet


Leave a comment