misc updates
parent
d58d0d472f
commit
65ce478c0e
|
@ -8,11 +8,11 @@ info:
|
||||||
- https://www.exploit-db.com/exploits/43342
|
- https://www.exploit-db.com/exploits/43342
|
||||||
- http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html
|
- http://blog.orange.tw/2019/07/attacking-ssl-vpn-part-1-preauth-rce-on-palo-alto.html
|
||||||
severity: critical
|
severity: critical
|
||||||
tags: cve,cve2017,rce,vpn,paloalto,globalprotect
|
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.80
|
cvss-score: 9.80
|
||||||
cve-id: CVE-2017-15944
|
cve-id: CVE-2017-15944
|
||||||
|
tags: cve,cve2017,rce,vpn,panos,globalprotect
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -24,9 +24,9 @@ requests:
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
part: body
|
||||||
words:
|
words:
|
||||||
- "@start@Success@end@"
|
- "@start@Success@end@"
|
||||||
part: body
|
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
|
|
|
@ -2,16 +2,16 @@ id: CVE-2018-10141
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: GlobalProtect Login page XSS
|
name: GlobalProtect Login page XSS
|
||||||
|
severity: medium
|
||||||
author: dhiyaneshDk
|
author: dhiyaneshDk
|
||||||
description: GlobalProtect Portal Login page in Palo Alto Networks PAN-OS before 8.1.4 allows an unauthenticated attacker to inject arbitrary JavaScript or HTML.
|
description: GlobalProtect Portal Login page in Palo Alto Networks PAN-OS before 8.1.4 allows an unauthenticated attacker to inject arbitrary JavaScript or HTML.
|
||||||
severity: medium
|
|
||||||
reference: https://nvd.nist.gov/vuln/detail/CVE-2018-10141
|
reference: https://nvd.nist.gov/vuln/detail/CVE-2018-10141
|
||||||
tags: globalprotect,xss,cve,cve2018,vpn
|
|
||||||
classification:
|
classification:
|
||||||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||||
cvss-score: 6.10
|
cvss-score: 6.10
|
||||||
cve-id: CVE-2018-10141
|
cve-id: CVE-2018-10141
|
||||||
cwe-id: CWE-79
|
cwe-id: CWE-79
|
||||||
|
tags: cve,cve2018,panos,vpn,globalprotect,xss
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
@ -21,14 +21,14 @@ requests:
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
part: body
|
||||||
words:
|
words:
|
||||||
- 'var valueUser = "j";-alert(1)-"x";'
|
- 'var valueUser = "j";-alert(1)-"x";'
|
||||||
part: body
|
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
part: header
|
||||||
words:
|
words:
|
||||||
- "text/html"
|
- "text/html"
|
||||||
part: header
|
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
|
|
|
@ -6,7 +6,7 @@ info:
|
||||||
severity: high
|
severity: high
|
||||||
description: Default Login of admin:admin on Palo Alto Networks PAN-OS application.
|
description: Default Login of admin:admin on Palo Alto Networks PAN-OS application.
|
||||||
reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/integrate-the-firewall-into-your-management-network/perform-initial-configuration.html#:~:text=By%20default%2C%20the%20firewall%20has,with%20other%20firewall%20configuration%20tasks.
|
reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/integrate-the-firewall-into-your-management-network/perform-initial-configuration.html#:~:text=By%20default%2C%20the%20firewall%20has,with%20other%20firewall%20configuration%20tasks.
|
||||||
tags: paloalto,panos,default-login
|
tags: panos,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -17,19 +17,19 @@ requests:
|
||||||
|
|
||||||
user={{username}}&passwd={{password}}&challengePwd=&ok=Login
|
user={{username}}&passwd={{password}}&challengePwd=&ok=Login
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
payloads:
|
payloads:
|
||||||
username:
|
username:
|
||||||
- admin
|
- admin
|
||||||
password:
|
password:
|
||||||
- admin
|
- admin
|
||||||
attack: pitchfork
|
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
part: header
|
||||||
words:
|
words:
|
||||||
- "Set-Cookie: PHPSESSID"
|
- "Set-Cookie: PHPSESSID"
|
||||||
part: header
|
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
|
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: PaloAlto Networks GlobalProtect Panel
|
name: PaloAlto Networks GlobalProtect Panel
|
||||||
author: organiccrap
|
author: organiccrap
|
||||||
severity: info
|
severity: info
|
||||||
tags: panel
|
tags: panel,panos
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- method: GET
|
||||||
|
@ -12,6 +12,7 @@ requests:
|
||||||
- "{{BaseURL}}/global-protect/login.esp"
|
- "{{BaseURL}}/global-protect/login.esp"
|
||||||
- "{{BaseURL}}/sslmgr"
|
- "{{BaseURL}}/sslmgr"
|
||||||
|
|
||||||
|
stop-at-first-match: true
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
|
|
Loading…
Reference in New Issue