// For flags

CVE-2012-4043

 

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Cross-site scripting (XSS) vulnerability in global-protect/login.esp in Palo Alto Networks Global Protect Portal, Global Protect Gateway, and SSL VPN portals 3.1.x through 3.1.11 and 4.0.x through 4.0.5 allows remote attackers to inject arbitrary web script or HTML via the inputStr parameter in a Login action.

Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en global-protect/login.esp en los portales Palo Alto Networks Global Protect Data, Global Protect Gateway y SSL VPN v3.1.x a v3.1.11 y v4.0.x a v4.0.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través del parámetro InputStr en una acción de inicio de sesión.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2012-07-20 CVE Reserved
  • 2012-07-26 CVE Published
  • 2024-09-17 CVE Updated
  • 2024-09-17 EPSS Updated
  • 2024-09-17 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Palo Alto
Search vendor "Palo Alto"
Global Protected Gateway
Search vendor "Palo Alto" for product "Global Protected Gateway"
3.1
Search vendor "Palo Alto" for product "Global Protected Gateway" and version "3.1"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Global Protected Gateway
Search vendor "Palo Alto" for product "Global Protected Gateway"
3.1.11
Search vendor "Palo Alto" for product "Global Protected Gateway" and version "3.1.11"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Global Protected Gateway
Search vendor "Palo Alto" for product "Global Protected Gateway"
4.0
Search vendor "Palo Alto" for product "Global Protected Gateway" and version "4.0"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Global Protected Gateway
Search vendor "Palo Alto" for product "Global Protected Gateway"
4.0.5
Search vendor "Palo Alto" for product "Global Protected Gateway" and version "4.0.5"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Ssl Vpn
Search vendor "Palo Alto" for product "Ssl Vpn"
3.1
Search vendor "Palo Alto" for product "Ssl Vpn" and version "3.1"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Ssl Vpn
Search vendor "Palo Alto" for product "Ssl Vpn"
3.1.11
Search vendor "Palo Alto" for product "Ssl Vpn" and version "3.1.11"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Ssl Vpn
Search vendor "Palo Alto" for product "Ssl Vpn"
4.0
Search vendor "Palo Alto" for product "Ssl Vpn" and version "4.0"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Ssl Vpn
Search vendor "Palo Alto" for product "Ssl Vpn"
4.0.5
Search vendor "Palo Alto" for product "Ssl Vpn" and version "4.0.5"
-
Affected
Palo Alto
Search vendor "Palo Alto"
Networks
Search vendor "Palo Alto" for product "Networks"
global_protect_portal
Search vendor "Palo Alto" for product "Networks" and version "global_protect_portal"
3.1
Affected
Palo Alto
Search vendor "Palo Alto"
Networks
Search vendor "Palo Alto" for product "Networks"
global_protect_portal
Search vendor "Palo Alto" for product "Networks" and version "global_protect_portal"
3.1.11
Affected
Palo Alto
Search vendor "Palo Alto"
Networks
Search vendor "Palo Alto" for product "Networks"
global_protect_portal
Search vendor "Palo Alto" for product "Networks" and version "global_protect_portal"
4.0
Affected
Palo Alto
Search vendor "Palo Alto"
Networks
Search vendor "Palo Alto" for product "Networks"
global_protect_portal
Search vendor "Palo Alto" for product "Networks" and version "global_protect_portal"
4.0.5
Affected