|
80696 | 80696 | "session_types": false, |
80697 | 80697 | "needs_cleanup": null |
80698 | 80698 | }, |
| 80699 | + "exploit_linux/http/panos_management_unauth_rce": { |
| 80700 | + "name": "Palo Alto Networks PAN-OS Management Interface Unauthenticated Remote Code Execution", |
| 80701 | + "fullname": "exploit/linux/http/panos_management_unauth_rce", |
| 80702 | + "aliases": [ |
| 80703 | + |
| 80704 | + ], |
| 80705 | + "rank": 600, |
| 80706 | + "disclosure_date": "2024-11-18", |
| 80707 | + "type": "exploit", |
| 80708 | + "author": [ |
| 80709 | + "watchTowr", |
| 80710 | + "sfewer-r7" |
| 80711 | + ], |
| 80712 | + "description": "This module exploits an authentication bypass vulnerability (CVE-2024-0012) and a command injection\n vulnerability (CVE-2024-9474) in the PAN-OS management web interface. An unauthenticated attacker can\n execute arbitrary code with root privileges.\n\n The following versions are affected:\n * PAN-OS 11.2 (up to and including 11.2.4-h1)\n * PAN-OS 11.1 (up to and including 11.1.5-h1)\n * PAN-OS 11.0 (up to and including 11.0.6-h1)\n * PAN-OS 10.2 (up to and including 10.2.12-h2)", |
| 80713 | + "references": [ |
| 80714 | + "CVE-2024-0012", |
| 80715 | + "CVE-2024-9474", |
| 80716 | + "URL-https://security.paloaltonetworks.com/CVE-2024-0012", |
| 80717 | + "URL-https://security.paloaltonetworks.com/CVE-2024-9474", |
| 80718 | + "URL-https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/" |
| 80719 | + ], |
| 80720 | + "platform": "Linux,Unix", |
| 80721 | + "arch": "cmd", |
| 80722 | + "rport": 443, |
| 80723 | + "autofilter_ports": [ |
| 80724 | + 80, |
| 80725 | + 8080, |
| 80726 | + 443, |
| 80727 | + 8000, |
| 80728 | + 8888, |
| 80729 | + 8880, |
| 80730 | + 8008, |
| 80731 | + 3000, |
| 80732 | + 8443 |
| 80733 | + ], |
| 80734 | + "autofilter_services": [ |
| 80735 | + "http", |
| 80736 | + "https" |
| 80737 | + ], |
| 80738 | + "targets": [ |
| 80739 | + "Default" |
| 80740 | + ], |
| 80741 | + "mod_time": "2024-12-17 17:47:00 +0000", |
| 80742 | + "path": "/modules/exploits/linux/http/panos_management_unauth_rce.rb", |
| 80743 | + "is_install_path": true, |
| 80744 | + "ref_name": "linux/http/panos_management_unauth_rce", |
| 80745 | + "check": true, |
| 80746 | + "post_auth": false, |
| 80747 | + "default_credential": false, |
| 80748 | + "notes": { |
| 80749 | + "Stability": [ |
| 80750 | + "crash-safe" |
| 80751 | + ], |
| 80752 | + "Reliability": [ |
| 80753 | + "repeatable-session" |
| 80754 | + ], |
| 80755 | + "SideEffects": [ |
| 80756 | + "ioc-in-logs" |
| 80757 | + ] |
| 80758 | + }, |
| 80759 | + "session_types": false, |
| 80760 | + "needs_cleanup": null |
| 80761 | + }, |
80699 | 80762 | "exploit_linux/http/panos_op_cmd_exec": { |
80700 | 80763 | "name": "Palo Alto Networks Authenticated Remote Code Execution", |
80701 | 80764 | "fullname": "exploit/linux/http/panos_op_cmd_exec", |
|
0 commit comments