Update CVE-2024-9465.yaml

patch-12
Ritik Chaddha 2024-10-10 17:18:25 +04:00 committed by GitHub
parent 96d81030b0
commit 4f1e260e15
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 5 additions and 3 deletions

View File

@ -1,7 +1,7 @@
id: CVE-2024-9465
info:
name: Palo Alto Expedition - Unauthenticated SQL Injection
name: Palo Alto Expedition - SQL Injection
author: DhiyaneshDK
severity: medium
description: |
@ -10,13 +10,14 @@ info:
- https://security.paloaltonetworks.com/PAN-SA-2024-0010
- https://github.com/horizon3ai/CVE-2024-9465/tree/main
- https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/
- https://nvd.nist.gov/vuln/detail/CVE-2024-9465
metadata:
verified: "true"
verified: true
max-request: 2
vendor: paloaltonetworks
product: expedition
shodan-query: http.favicon.hash:1499876150
tags: cve,cve2024,palo-alto,sqli,unauth
tags: cve,cve2024,palo-alto,sqli
flow: http(1) && http(2)
@ -39,6 +40,7 @@ http:
- raw:
- |
@timeout: 20s
POST /bin/configurations/parsers/Checkpoint/CHECKPOINT.php HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded