Update CVE-2024-9465.yaml
parent
96d81030b0
commit
4f1e260e15
|
@ -1,7 +1,7 @@
|
|||
id: CVE-2024-9465
|
||||
|
||||
info:
|
||||
name: Palo Alto Expedition - Unauthenticated SQL Injection
|
||||
name: Palo Alto Expedition - SQL Injection
|
||||
author: DhiyaneshDK
|
||||
severity: medium
|
||||
description: |
|
||||
|
@ -10,13 +10,14 @@ info:
|
|||
- https://security.paloaltonetworks.com/PAN-SA-2024-0010
|
||||
- https://github.com/horizon3ai/CVE-2024-9465/tree/main
|
||||
- https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/
|
||||
- https://nvd.nist.gov/vuln/detail/CVE-2024-9465
|
||||
metadata:
|
||||
verified: "true"
|
||||
verified: true
|
||||
max-request: 2
|
||||
vendor: paloaltonetworks
|
||||
product: expedition
|
||||
shodan-query: http.favicon.hash:1499876150
|
||||
tags: cve,cve2024,palo-alto,sqli,unauth
|
||||
tags: cve,cve2024,palo-alto,sqli
|
||||
|
||||
flow: http(1) && http(2)
|
||||
|
||||
|
@ -39,6 +40,7 @@ http:
|
|||
|
||||
- raw:
|
||||
- |
|
||||
@timeout: 20s
|
||||
POST /bin/configurations/parsers/Checkpoint/CHECKPOINT.php HTTP/1.1
|
||||
Host: {{Hostname}}
|
||||
Content-Type: application/x-www-form-urlencoded
|
||||
|
|
Loading…
Reference in New Issue