First published: Wed Oct 09 2024(Updated: )
A reflected XSS vulnerability in Palo Alto Networks Expedition enables execution of malicious JavaScript in the context of an authenticated Expedition user's browser if that user clicks on a malicious link, allowing phishing attacks that could lead to Expedition browser session theft.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Expedition | >=1.2.0<1.2.96 |
The fixes for all listed issues are available in Expedition 1.2.96, and all later Expedition versions. All Expedition usernames, passwords, and API keys should be rotated after upgrading to the fixed version of Expedition. All firewall usernames, passwords, and API keys processed by Expedition should be rotated after updating.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9467 has a medium severity rating due to its potential for exploitation through reflected XSS attacks.
Mitigation of CVE-2024-9467 involves patching the affected version of Palo Alto Networks Expedition to ensure protection against reflected XSS vulnerabilities.
CVE-2024-9467 affects Palo Alto Networks Expedition versions 1.2.0 to 1.2.96, excluding version 1.2.96.
CVE-2024-9467 facilitates reflected cross-site scripting (XSS) attacks that could lead to phishing and browser session theft.
Successful exploitation of CVE-2024-9467 can allow attackers to execute malicious JavaScript in an authenticated user's browser, compromising their session.