Skip to content

PAN-OS Management Panel - Detect

ID: panos-management-panel

Severity: info

Author: bhutch

Tags: panel,panos,login,detect,paloaltonetworks

PAN-OS management panel was detected.

id: panos-management-panel
info:
name: PAN-OS Management Panel - Detect
author: bhutch
severity: info
description: |
PAN-OS management panel was detected.
reference:
- https://security.paloaltonetworks.com/PAN-SA-2024-0015
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cwe-id: CWE-200
metadata:
verified: true
max-request: 1
shodan-query: http.favicon.hash:873381299
tags: panel,panos,login,detect,paloaltonetworks
http:
- method: GET
path:
- "{{BaseURL}}/php/login.php"
matchers-condition: and
matchers:
- type: word
part: body
words:
- "<TITLE>Login</TITLE>"
- 'PAN_FORM_CONTENT'
condition: and
- type: status
status:
- 200
# digest: 490a0046304402204d48e15afae03dc5c23f402a44ecd3990bfe950dd245dcd43d128b12831f4b730220562d2149ce269dff544d9240122eefbc14ef2026ec789635aa64e8fdaddbba30:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/exposed-panels/panos-management-panel.yaml"

View on Github