This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Failing PCI Scans because of outdated jQuery in User Portal - Is there a fix?

We are failing our PCI compliance scans on every XG firewall we have that has the user portal enabled.  Our PCI compliance scanning company is telling us this:

 

Description:  "jQuery is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Asynchronous JavaScript and Extensible Markup Language (AJAX) Request is performed without the dataType option, causing text/javascript responses to be executed.  This finding indicates that either the root domain url, sub-domain url, or an imported/sourced version of jQuery is below jQuery version 3.0. All three scenarios allow an attacker to execute cross site scripting attacks on the root domain."

Evidence: jQuery appears to be '2.1.3' and needs to be at '3.0.0' or higher

 

This is ONLY happening on the port used by the User Portal.  To verify this we changed the port to another number, had a host rescanned, and the vulnerability was found on that new port.

 

Is there anything I can do to get this fixed or do I have to wait for Sophos to update the jQuery version they are using?  Is there a bug report place I can put this if that's the case or who do I contact?

 



This thread was automatically locked due to age.
Parents
  • Apparently this is patched.  Just dispute the finding with Trustwave. 

    See KB from Sophos here:

    https://community.sophos.com/kb/en-us/132741

  • I sent the link to the scanning company and they don't like it.  They asked me to provide the current version of jQuery actually running on the box.  So I opened our user portal in Chrome then opened up the developer tools.  On the console tab I typed in jQuery.fn.jQuery and it returned "2.1.3".

     

    Not sure how they are mitigating the problem but their explanation isn't going to work for my PCI scanning company.  Anyone running 7.5 that can try doing the same?

  • I just installed 17.5 last night and getting:

    jQuery.fn.jquery
    "2.1.3"

    I also got the same comment back from scanning company.

  • Thanks for checking guys.

    Well this is no good....I can't exactly disable my user portal.  Although if Sophos would fix it so it didn't show up on every external IP address at least I would have less violations (currently being flagged 5 times for the same thing since it seems we can't lock down the user portal to a single IP address).

    How do we get Sophos to take action on this?  Submit a bug to support?

     

    Edit: I'm opening a support case, suggest others do the same.

  • It doesn't seem like Sophos really understands this issue from the client's perspective.  PCI compliance isn't optional if you take credit cards and disputing scan results can be near impossible to win depending on what it is.  

  • What I don't understand is they put out a advisory that says its a false positive with no information about how they mitigated the vulnerability while still running the old version.  If they actually described what they did I might be able to get the scanning company to pass it but their article leaves a lot to be desired.

  • i did not dig to deep into this issue/challange but as far as i know, the product is harden. So basically if the PCI Scan only checks for the version, which i assume, it will most likely point out the "FP". But we fixed the "capability" of using this CVE. 

    So what i would like to know, how did the PCI-DSS audit point out, that CVE is still be affected? 

    Most likely, because it is fast and simply, they only scan the version, not the "real capability of using the vulnerability"

  • Here is the problem.  I talked to them and they said the version found, 2.1.3, has the vulnerability.  I told them that you guys "fixed it" and its a false positive.  I gave them the link to the KB article.  They read it and told me that the article doesn't say anything other then its a false positive and since it has nothing about what was done they cannot pass me.  They said the do not check further into it other then the version and won't do any other testing. 

    So either the software needs to be updated to 3.0.0+ or a detailed description of how the vulnerability is fixed needs to be in the KB article.  Otherwise I will continue to fail the scans.

  • Interesting approach. So i would suggest to open a case to get the answer of the patch, which was applied. 

    But basically this is "a normal process". You do not publish the whole Harding process. 

    Sophos Support should give you more details. 

  • I have put in a support request.  Here is there answer which doesn't help at all:

     

    "Thank you for contacting sophos technical support today.  Just to let you that this issue in not currently a technical support issue as we provided this KB https://community.sophos.com/kb/en-us/132741.  Current there is no ETA when this version will be upgraded to 3.0 or higher.  If you require different answer please contact your account manager about this issue."

     

    I replied and told them I needed more information to satisfy our PCI scanning company and have received no response yet.

  • This issue was allready reported by myself during the Beta Period. See: https://community.sophos.com/products/xg-firewall/sophos-xg-beta-programs/sfos-v17-5-early-access/f/sophos-xg-17-5-early-access/108784/planned-login-screen-change-for-17-5-final

     

    I do not understand at all, why they need a full JQuery for a simple Login Screen. This makes Loginscreen huge (2.2Mbytes which has to be transfered for each Request). 

    From my point of view, this is a good example on what happens, if in a Company the Marketing guys are going to decide about stuff like this instead of technicans/developers.

  • Hi HuberChristian,

     

    We are aware of the issue with this False Positive and we would request you to contact your Partner or open a case with Sophos Support so this issue can be sorted out earlier. . 

     

    Please mention the link of this thread and the results of your PCI scan .Also mention the KB article. 

    https://sophos.com/kb/132741

Reply Children
  • Aditya Patel said:

    We are aware of the issue with this False Positive and we would request you to contact your Partner or open a case with Sophos Support so this issue can be sorted out earlier. .

    Please mention the link of this thread and the results of your PCI scan .Also mention the KB article.

    Again, this is not the answer. I have already contacted support and all support did was point me to the same article.  I told them I needed more information on that and I never got another reply.

  • Which information do you need? 

    Seems like it is fixed. We did not update the version, instead we closed this CVE with a fix. 

    So - what should we give you for information? 

  • We need to know what was done to fix the vulnerability.  Something our PCI compliance scanning company can document as to why to approve a dispute of what they found.  Your article says "Its not really broke" without giving even the slightest bit of information of why its not still broke.  And since the scanning company simply looks to see what version its running and sees 2.1.3 they are failing us because again you are not providing anything other then "Trust us....its fine".

     

    Say every time you drove your car above 60 MPH the check engine light went on.  You contacted the manufacture and they told you "Oh...its a false positive." and you asked "But why does it do it?" and they just told you again "Its fine, its a false positive".  How much faith would you actually have in their answer or your car? 

  • "Say every time you drove your car above 60 MPH the check engine light went on.  You contacted the manufacture and they told you "Oh...its a false positive." and you asked "But why does it do it?" and they just told you again "Its fine, its a false positive".  How much faith would you actually have in their answer or your car? "

    Would suggest another analogy. When you drive 60 MPH, you could open the hatchback from outside. You never did this before and you notice it in a report. The car vendor fix this issue and told you, it is not possible anymore. What do you do? Driving 60 MPH and trying to open the hatchback i would suggest.

     

    And this is your next step. If you do not believe our KBA, try to exploit the vulnerability.

     

    Maybe i am quite harsh. It is my approach in this case. 

     

  • The problem is you are the one providing the firewall, you are running the outdated jQuery software, you should be the ones that can provide what you did to make it secure or at least some information.  It shouldn't be up to me or the PCI scanning company.  They identified you are running a outdated version with a specific vulnerability and are asking you for information on how it was fixed other then "its a false positive".  For all they know you did nothing and just put up a article saying its a false positive.

     

    And the reason this is important is because this XG product suffers from lots of other vulnerabilities that need manual intervention to fix.  Like the fact it supports 3DES encryption, TLS1.0, TLS1.1, and HTTP Track/Trace all by default and all that fail PCI compliance scans.  All these things need to be manually turned off through the console and get re-enabled every time there is a firmware update.

  • You should talk to your Sales Rep about this to get a proper answer to this topic. 

  • LuCar Toni said:

    You should talk to your Sales Rep about this to get a proper answer to this topic. 

     

    Please don't take this wrong but I came to these forums for a answer.  When that wasn't looking very positive I put in a support request.  So if you, a Sophos staff member, cannot answer the question here and your support people (case #8496846) can't answer the question through their channels then the only reason I would be contacting my sales rep is to find alternatives to your product.

     

    With that said it is not something I want to do, especially after investing in 3 XG's and 12 - 14 REDs.  I like the product overall but for a security appliance it seems to have a decent amount of security related issues.

  • I am here in my free time without any relation to the support and product management. Just trying to help people in getting some answers. 

     

    PS: The point about sales rep is to follow up the Support Case to get a proper "official" answer. 

  • Here's the response I got back from my scanning company after I filed the dispute:


    In order for us to properly process this dispute, we require the full jQuery version currently running on this system.

  • I opened a support ticket and got the following email this morning as well which doesn't help. :

     

    I have confirmed with our global escalations team (GES) that the XG is patched since MR2 however the detection will falsely be detected. 

    It it scheduled to be fixed in 18.5, however this may change and we do not have a set date for when this will be released. 

    Please let me know if you have any further questions, or if you are happy for the case to be archived?