First published: Tue Mar 26 2019(Updated: )
The Expedition Migration tool 1.1.8 and earlier may allow an authenticated attacker to run arbitrary JavaScript or HTML in the RADIUS server settings.
Credit: psirt@paloaltonetworks.com psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Expedition | <=1.1.8 | |
<=1.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1571 has been classified as a medium severity vulnerability.
CVE-2019-1571 allows an authenticated attacker to execute arbitrary JavaScript or HTML in RADIUS server settings.
To fix CVE-2019-1571, upgrade the Expedition tool to version 1.1.9 or later.
CVE-2019-1571 affects users of the Palo Alto Networks Expedition Migration tool up to version 1.1.8.
CVE-2019-1571 can only be exploited by an authenticated user with access to the RADIUS server settings.