-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0064
           Security update for Palo Alto Networks Migration Tool
                               1 March 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Palo Alto Expedition
Operating System:     Virtualisation
Impact/Access:        Cross-site Scripting -- Existing Account
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-1567  
Member content until: Sunday, March 31 2019

OVERVIEW

        Palo Alto Networks has addressed a stored cross-site scripting (XSS)
        vulnerability in the Palo Alto Expedition for versions 1.1.6 and 
        earlier .[1]


IMPACT

        The vendor provided the following detail on the vulnerability:
        
        "A stored cross-site scripting (XSS) vulnerability exists in the 
        Palo Alto Networks Migration Tool ("Expedition"). (Ref # MT-908/ 
        CVE-2019-1567)
        
        Severity: Low
        
        Successful exploitation of this issue may allow an authenticated 
        attacker to inject arbitrary JavaScript or HTML in the User Mapping
        Settings."[1]


MITIGATION

        The vendor advises updating to Expedition 1.1.7 or later to address
        this issue. [1]


REFERENCES

        [1] Stored Cross-Site Scripting in Expedition Migration Tool
            https://securityadvisories.paloaltonetworks.com/Home/Detail/141

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=Mm9N
-----END PGP SIGNATURE-----