Skip to content

Commit 4ab9664

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent e70b6c7 commit 4ab9664

File tree

1 file changed

+63
-0
lines changed

1 file changed

+63
-0
lines changed

db/modules_metadata_base.json

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80696,6 +80696,69 @@
8069680696
"session_types": false,
8069780697
"needs_cleanup": null
8069880698
},
80699+
"exploit_linux/http/panos_management_unauth_rce": {
80700+
"name": "Palo Alto Networks PAN-OS Management Interface Unauthenticated Remote Code Execution",
80701+
"fullname": "exploit/linux/http/panos_management_unauth_rce",
80702+
"aliases": [
80703+
80704+
],
80705+
"rank": 600,
80706+
"disclosure_date": "2024-11-18",
80707+
"type": "exploit",
80708+
"author": [
80709+
"watchTowr",
80710+
"sfewer-r7"
80711+
],
80712+
"description": "This module exploits an authentication bypass vulnerability (CVE-2024-0012) and a command injection\n vulnerability (CVE-2024-9474) in the PAN-OS management web interface. An unauthenticated attacker can\n execute arbitrary code with root privileges.\n\n The following versions are affected:\n * PAN-OS 11.2 (up to and including 11.2.4-h1)\n * PAN-OS 11.1 (up to and including 11.1.5-h1)\n * PAN-OS 11.0 (up to and including 11.0.6-h1)\n * PAN-OS 10.2 (up to and including 10.2.12-h2)",
80713+
"references": [
80714+
"CVE-2024-0012",
80715+
"CVE-2024-9474",
80716+
"URL-https://security.paloaltonetworks.com/CVE-2024-0012",
80717+
"URL-https://security.paloaltonetworks.com/CVE-2024-9474",
80718+
"URL-https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/"
80719+
],
80720+
"platform": "Linux,Unix",
80721+
"arch": "cmd",
80722+
"rport": 443,
80723+
"autofilter_ports": [
80724+
80,
80725+
8080,
80726+
443,
80727+
8000,
80728+
8888,
80729+
8880,
80730+
8008,
80731+
3000,
80732+
8443
80733+
],
80734+
"autofilter_services": [
80735+
"http",
80736+
"https"
80737+
],
80738+
"targets": [
80739+
"Default"
80740+
],
80741+
"mod_time": "2024-12-17 17:47:00 +0000",
80742+
"path": "/modules/exploits/linux/http/panos_management_unauth_rce.rb",
80743+
"is_install_path": true,
80744+
"ref_name": "linux/http/panos_management_unauth_rce",
80745+
"check": true,
80746+
"post_auth": false,
80747+
"default_credential": false,
80748+
"notes": {
80749+
"Stability": [
80750+
"crash-safe"
80751+
],
80752+
"Reliability": [
80753+
"repeatable-session"
80754+
],
80755+
"SideEffects": [
80756+
"ioc-in-logs"
80757+
]
80758+
},
80759+
"session_types": false,
80760+
"needs_cleanup": null
80761+
},
8069980762
"exploit_linux/http/panos_op_cmd_exec": {
8070080763
"name": "Palo Alto Networks Authenticated Remote Code Execution",
8070180764
"fullname": "exploit/linux/http/panos_op_cmd_exec",

0 commit comments

Comments
 (0)