diff --git a/http/cves/2024/CVE-2024-9465.yaml b/http/cves/2024/CVE-2024-9465.yaml index 4e47afa4db..30a2d376f7 100644 --- a/http/cves/2024/CVE-2024-9465.yaml +++ b/http/cves/2024/CVE-2024-9465.yaml @@ -1,7 +1,7 @@ id: CVE-2024-9465 info: - name: Palo Alto Expedition - Unauthenticated SQL Injection + name: Palo Alto Expedition - SQL Injection author: DhiyaneshDK severity: medium description: | @@ -10,13 +10,14 @@ info: - https://security.paloaltonetworks.com/PAN-SA-2024-0010 - https://github.com/horizon3ai/CVE-2024-9465/tree/main - https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/ + - https://nvd.nist.gov/vuln/detail/CVE-2024-9465 metadata: - verified: "true" + verified: true max-request: 2 vendor: paloaltonetworks product: expedition shodan-query: http.favicon.hash:1499876150 - tags: cve,cve2024,palo-alto,sqli,unauth + tags: cve,cve2024,palo-alto,sqli flow: http(1) && http(2) @@ -39,6 +40,7 @@ http: - raw: - | + @timeout: 20s POST /bin/configurations/parsers/Checkpoint/CHECKPOINT.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded