Security Advisory ID: NSKPSA2020-002
Last Modified: October 19th, 2020
|Who should read this document
|Technical and Security Personnel
|Impact of Vulnerability
|Overall CVSS Score
|Verification of update to the latest release of the Netskope Admin UI.
|Security Advisory Replacement
|Netskope Admin UI Software Version before 79.0.0
|Updated Software Version
|Netskope Admin UI Software Version 79
|Special Notes and Acknowledgements
|The Etisalat - Red Team
|CWE-1236: Improper Neutralization of Formula Elements in a CSV File
This update resolves an issue within the Netskope Admin UI where an unauthenticated user can inject malicious payload in Admin UI that can compromise Admin’s machine when a CSV report is downloaded.
This Release/patch remediates the following issues: CVE-2020-nnnn
Netskope Admin UI – Downloading Audit log report.
All of these issues are resolved in Netskope Admin UI version R79 released on October 12th- 14th.
This vulnerability was triaged, validated, and fixed by Netskope. Customers are automatically upgraded Netskope Admin UI to Release 79.
Special Notes and Acknowledgement
Netskope credits Aamir Rehman from Etisalat Red Team for reporting this flaw.
This security Advisory was written by the Product Security Incident Response Team, Netskope, Inc.
Do we use this for communication when a customer is abusing our systems?
No, please reach out to [email protected] for support on this.
What is affected by this security vulnerability?
Netskope Web Interface used by customers to manage their tenant(s).
Do I need to Update Immediately?
No action required by our customers. This is an acknowledgment of the vulnerability and CVE.
Any Netskope Admin UI Software Versions prior to R79.
What issues does this release and/or patch address?
The release includes the fix for the reported issue as well as other items which can be found at: Netskope Support Release Notes
How do I know if my Netskope WebUI is vulnerable or not?
The product and version can be found by visiting the Netskope Admin UI Dashboard, click Settings, check the Software Version.
What has Netskope done to resolve the issue?
Netskope has fixed the issue in Release 79 to address this security flaw. Customer environments are automatically patched as part of our release process.
Where do I download the fix?
How does Netskope respond to this and any other security flaws?
Netskope has a private bug bounty program as well as the following public guidance for reporting concerns and issues from the research community which can be found at: Vulnerability Disclosure Policy.
Netskope follows a documented triage, remediation, and testing process for any reported items.
How do I find out about security vulnerabilities with your products?
Please visit the security advisory section of our support page at: Security Advisories.
How was this found?
This was found and reported to Netskope from Aamir Rehman – Etisalat Red Team via Netskope’s published vulnerability disclosure process.
We'd love to hear from you!