CVE-2013-5663

The App-ID cache feature in Palo Alto Networks PAN-OS before 4.0.14, 4.1.x before 4.1.11, and 5.0.x before 5.0.2 allows remote attackers to bypass intended security policies via crafted requests that trigger invalid caching, as demonstrated by incorrect identification of HTTP traffic as SIP traffic, aka Ref ID 47195.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.0:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.1:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.2:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.3:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.4:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.5:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.6:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.0.7:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.3:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.4:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.5:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.6:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.7:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.8:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.8-h3:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.9:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:4.1.10:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:5.0.0:*:*:*:*:*:*:*
cpe:2.3:o:paloaltonetworks:pan-os:5.0.0-h1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:57

Type Values Removed Values Added
References () http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx - () http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx -
References () http://pastie.org/pastes/5568186/text - Exploit () http://pastie.org/pastes/5568186/text - Exploit
References () http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/ - () http://researchcenter.paloaltonetworks.com/2013/01/app-id-cache-pollution-update/ -
References () https://security.paloaltonetworks.com/CVE-2013-5663 - () https://security.paloaltonetworks.com/CVE-2013-5663 -

07 Nov 2023, 02:16

Type Values Removed Values Added
References
  • {'url': 'http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20(Brad%20Woodberg%20-%20Final).pptx', 'name': 'http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20(Brad%20Woodberg%20-%20Final).pptx', 'tags': [], 'refsource': 'MISC'}
  • () http://cansecwest.com/csw11/Network%20Application%20FW%20vs.%20Contemporary%20Threats%20%28Brad%20Woodberg%20-%20Final%29.pptx -

Information

Published : 2013-08-31 17:55

Updated : 2024-11-21 01:57


NVD link : CVE-2013-5663

Mitre link : CVE-2013-5663

CVE.ORG link : CVE-2013-5663


JSON object : View

Products Affected

paloaltonetworks

  • pan-os
CWE
CWE-264

Permissions, Privileges, and Access Controls