An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system.
Fixes

Solution

No solution given by the vendor.


Workaround

Ensure that all network access to Expedition is restricted to only authorized users, hosts, and networks. If you are not actively using Expedition, make sure that your Expedition software is shut down.

History

Mon, 13 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 11 Jan 2025 03:15:00 +0000

Type Values Removed Values Added
Description An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system.
Title Expedition: SQL Injection Vulnerability
Weaknesses CWE-89
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N/AU:N/R:U/V:C/RE:H/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2025-01-13T19:52:47.949Z

Reserved: 2024-12-20T23:22:57.417Z

Link: CVE-2025-0103

cve-icon Vulnrichment

Updated: 2025-01-13T19:52:43.572Z

cve-icon NVD

Status : Received

Published: 2025-01-11T03:15:22.020

Modified: 2025-01-11T03:15:22.020

Link: CVE-2025-0103

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.