Palo Alto Networks PANOS <= 5.0.8 XSS A couple of bugs exist in Palo Alto Networks PANOS <= 5.0.8 which can be exploited to conduct cross-site scripting attacks. Certificate fields are displayed in the firewall web interface without proper sanitization applied to them. This way it is possible to inject html into the web interface. Various file upload forms used by the firewall do not implement proper CSRF protection. import.certificate.php for example. Example of a certificate containing html that will be rendered: Certificate: Data: Version: 1 (0x0) Serial Number: e5:67:53:d1:e4:2a:71:ec Signature Algorithm: sha1WithRSAEncryption Issuer: C=XX, ST=