This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Failing PCI Scans because of outdated jQuery in User Portal - Is there a fix?

We are failing our PCI compliance scans on every XG firewall we have that has the user portal enabled.  Our PCI compliance scanning company is telling us this:

 

Description:  "jQuery is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Asynchronous JavaScript and Extensible Markup Language (AJAX) Request is performed without the dataType option, causing text/javascript responses to be executed.  This finding indicates that either the root domain url, sub-domain url, or an imported/sourced version of jQuery is below jQuery version 3.0. All three scenarios allow an attacker to execute cross site scripting attacks on the root domain."

Evidence: jQuery appears to be '2.1.3' and needs to be at '3.0.0' or higher

 

This is ONLY happening on the port used by the User Portal.  To verify this we changed the port to another number, had a host rescanned, and the vulnerability was found on that new port.

 

Is there anything I can do to get this fixed or do I have to wait for Sophos to update the jQuery version they are using?  Is there a bug report place I can put this if that's the case or who do I contact?

 



This thread was automatically locked due to age.
Parents
  • So my dispute was accepted.  I sent the following text for my dispute:

     

    The Sophos firewall is running 2.1.3.  The Sophos support department has confirmed from dev team that the CVE-2015-9251 false positive result has been patched and hardened. 

    I'm now running the latest sophos version 17.5

    I received the following from:

    I have confirmed with our global escalations team (GES) that the XG is patched since MR2 however the detection will falsely be detected.

    It it scheduled to be fixed in 18.5, however this may change and we do not have a set date for when this will be released.

Reply
  • So my dispute was accepted.  I sent the following text for my dispute:

     

    The Sophos firewall is running 2.1.3.  The Sophos support department has confirmed from dev team that the CVE-2015-9251 false positive result has been patched and hardened. 

    I'm now running the latest sophos version 17.5

    I received the following from:

    I have confirmed with our global escalations team (GES) that the XG is patched since MR2 however the detection will falsely be detected.

    It it scheduled to be fixed in 18.5, however this may change and we do not have a set date for when this will be released.

Children
No Data