From 4ab9664cc64eded8fc5f48fcf0d7ba370b1425b3 Mon Sep 17 00:00:00 2001 From: jenkins-metasploit Date: Mon, 30 Dec 2024 18:35:19 +0000 Subject: [PATCH] automatic module_metadata_base.json update --- db/modules_metadata_base.json | 63 +++++++++++++++++++++++++++++++++++ 1 file changed, 63 insertions(+) diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index f95bca9c8a4c..c4f84f14cb53 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -80696,6 +80696,69 @@ "session_types": false, "needs_cleanup": null }, + "exploit_linux/http/panos_management_unauth_rce": { + "name": "Palo Alto Networks PAN-OS Management Interface Unauthenticated Remote Code Execution", + "fullname": "exploit/linux/http/panos_management_unauth_rce", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2024-11-18", + "type": "exploit", + "author": [ + "watchTowr", + "sfewer-r7" + ], + "description": "This module exploits an authentication bypass vulnerability (CVE-2024-0012) and a command injection\n vulnerability (CVE-2024-9474) in the PAN-OS management web interface. An unauthenticated attacker can\n execute arbitrary code with root privileges.\n\n The following versions are affected:\n * PAN-OS 11.2 (up to and including 11.2.4-h1)\n * PAN-OS 11.1 (up to and including 11.1.5-h1)\n * PAN-OS 11.0 (up to and including 11.0.6-h1)\n * PAN-OS 10.2 (up to and including 10.2.12-h2)", + "references": [ + "CVE-2024-0012", + "CVE-2024-9474", + "URL-https://security.paloaltonetworks.com/CVE-2024-0012", + "URL-https://security.paloaltonetworks.com/CVE-2024-9474", + "URL-https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/" + ], + "platform": "Linux,Unix", + "arch": "cmd", + "rport": 443, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "Default" + ], + "mod_time": "2024-12-17 17:47:00 +0000", + "path": "/modules/exploits/linux/http/panos_management_unauth_rce.rb", + "is_install_path": true, + "ref_name": "linux/http/panos_management_unauth_rce", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "Reliability": [ + "repeatable-session" + ], + "SideEffects": [ + "ioc-in-logs" + ] + }, + "session_types": false, + "needs_cleanup": null + }, "exploit_linux/http/panos_op_cmd_exec": { "name": "Palo Alto Networks Authenticated Remote Code Execution", "fullname": "exploit/linux/http/panos_op_cmd_exec",