{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0011","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","state":"PUBLISHED","assignerShortName":"palo_alto","dateReserved":"2023-11-09T18:56:10.434Z","datePublished":"2024-02-14T17:32:34.809Z","dateUpdated":"2024-08-01T17:41:15.533Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PAN-OS","vendor":"Palo Alto Networks","versions":[{"changes":[{"at":"8.1.24","status":"unaffected"}],"lessThan":"8.1.24","status":"affected","version":"8.1","versionType":"custom"},{"changes":[{"at":"9.0.17","status":"unaffected"}],"lessThan":"9.0.17","status":"affected","version":"9.0","versionType":"custom"},{"changes":[{"at":"9.1.13","status":"unaffected"}],"lessThan":"9.1.13","status":"affected","version":"9.1","versionType":"custom"},{"changes":[{"at":"10.0.11","status":"unaffected"}],"lessThan":"10.0.11","status":"affected","version":"10.0","versionType":"custom"},{"changes":[{"at":"10.1.3","status":"unaffected"}],"lessThan":"10.1.3","status":"affected","version":"10.1","versionType":"custom"},{"status":"unaffected","version":"10.2"},{"status":"unaffected","version":"11.0"},{"status":"unaffected","version":"11.1"}]},{"defaultStatus":"unaffected","product":"Prisma Access","vendor":"Palo Alto Networks","versions":[{"status":"unaffected","version":"All"}]},{"defaultStatus":"unaffected","product":"Cloud NGFW","vendor":"Palo Alto Networks","versions":[{"status":"unaffected","version":"All"}]}],"configurations":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue is applicable only to firewalls that are configured to use Captive Portal authentication. You can verify whether you have Captive Portal configured in the Captive Portal Settings page (Device &gt; User Identification &gt; Captive Portal Settings)."}],"value":"This issue is applicable only to firewalls that are configured to use Captive Portal authentication. You can verify whether you have Captive Portal configured in the Captive Portal Settings page (Device > User Identification > Captive Portal Settings)."}],"credits":[{"lang":"en","type":"finder","value":"Palo Alto Networks thanks Darek Jensen and an external reporter for discovering and reporting this issue."}],"datePublic":"2024-02-14T17:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of an authenticated Captive Portal user’s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft."}],"value":"A reflected cross-site scripting (XSS) vulnerability in the Captive Portal feature of Palo Alto Networks PAN-OS software enables execution of malicious JavaScript (in the context of an authenticated Captive Portal user’s browser) if a user clicks on a malicious link, allowing phishing attacks that could lead to credential theft."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.<br>"}],"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-02-14T17:32:34.809Z"},"references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-0011"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.13, PAN-OS 10.0.11, PAN-OS 10.1.3, and all later PAN-OS versions."}],"value":"This issue is fixed in PAN-OS 8.1.24, PAN-OS 9.0.17, PAN-OS 9.1.13, PAN-OS 10.0.11, PAN-OS 10.1.3, and all later PAN-OS versions."}],"source":{"defect":["PAN-175970"],"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-02-14T17:00:00.000Z","value":"Initial publication"}],"title":"PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in Captive Portal Authentication","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 93070 (Applications and Threats content update 8810).<br>"}],"value":"Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 93070 (Applications and Threats content update 8810).\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-0011","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-02-14T19:24:56.532361Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-05T17:21:19.407Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T17:41:15.533Z"},"title":"CVE Program Container","references":[{"url":"https://security.paloaltonetworks.com/CVE-2024-0011","tags":["x_transferred"]}]}]}}