# PAN-OS:全局保护中任意文件创建导致操作系统命令注入漏洞
## 漏洞概述
Palo Alto Networks PAN-OS软件的GlobalProtect特性中存在任意文件创建漏洞,导致命令注入。未经身份验证的攻击者可以执行任意代码并以root权限在防火墙上运行。
## 影响版本
特定的PAN-OS版本和特性的配置受到影响。
## 细节
漏洞是由于GlobalProtect特性的任意文件创建功能导致的。攻击者可以利用此漏洞在防火墙上进行命令注入,从而执行任意代码并获得root权限。
## 影响
Cloud NGFW、Panorama设备和Prisma Access不受此漏洞影响。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | This script is designed to demonstrate the exploitation of vulnerabilities in PAN-OS firewalls. It sends a specially crafted payload to the firewall's API endpoint to execute arbitrary commands. | https://github.com/DrewskyDev/CVE-2024-3400 | POC详情 |
2 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/bigsclowns/CVE-2024-3400-POC | POC详情 |
3 | None | https://github.com/Yuvvi01/CVE-2024-3400 | POC详情 |
4 | CVE-2024-3400 Checker | https://github.com/shamo0/CVE-2024-3400 | POC详情 |
5 | None | https://github.com/CerTusHack/CVE-2024-3400-PoC | POC详情 |
6 | None | https://github.com/0x0d3ad/CVE-2024-3400 | POC详情 |
7 | None | https://github.com/FoxyProxys/CVE-2024-3400 | POC详情 |
8 | None | https://github.com/momika233/CVE-2024-3400 | POC详情 |
9 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/kerberoshacker/CVE-2024-3400-POC | POC详情 |
10 | Vulnerabilidad de palo alto | https://github.com/MrR0b0t19/CVE-2024-3400 | POC详情 |
11 | A simple bash script to check for evidence of compromise related to CVE-2024-3400 | https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker | POC详情 |
12 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/kerberoshacker2/CVE-2024-3400-POC | POC详情 |
13 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | https://github.com/AdaniKamal/CVE-2024-3400 | POC详情 |
14 | None | https://github.com/LoanVitor/CVE-2024-3400- | POC详情 |
15 | CVE-2024-3400 Palo Alto OS Command Injection | https://github.com/h4x0r-dz/CVE-2024-3400 | POC详情 |
16 | CVE-2024-3400 | https://github.com/W01fh4cker/CVE-2024-3400 | POC详情 |
17 | None | https://github.com/CONDITIONBLACK/CVE-2024-3400-POC | POC详情 |
18 | None | https://github.com/Chocapikk/CVE-2024-3400 | POC详情 |
19 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | https://github.com/ihebski/CVE-2024-3400 | POC详情 |
20 | CVE-2024-3400-RCE | https://github.com/W01fh4cker/CVE-2024-3400-RCE | POC详情 |
21 | A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。 | https://github.com/index2014/CVE-2024-3400-Checker | POC详情 |
22 | CVE-2024-3400-RCE | https://github.com/admi-n/CVE-2024-3400-RCE-copy | POC详情 |
23 | Have we not learnt from HoneyPoC? | https://github.com/ZephrFish/CVE-2024-3400-Canary | POC详情 |
24 | Global Protec Palo Alto File Write Exploit | https://github.com/ak1t4/CVE-2024-3400 | POC详情 |
25 | Simple POC for CVE-2024-3400 | https://github.com/phantomradar/cve-2024-3400-poc | POC详情 |
26 | CVE-2024-3400 : Palo Alto OS Command Injection - POC | https://github.com/retkoussa/CVE-2024-3400 | POC详情 |
27 | None | https://github.com/schooldropout1337/CVE-2024-3400 | POC详情 |
28 | EDL for IPs attacking customers with CVE-2024-3400 | https://github.com/hahasagined/CVE-2024-3400 | POC详情 |
29 | Simple Python code to check for arbitrary uploading | https://github.com/codeblueprint/CVE-2024-3400 | POC详情 |
30 | Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts | https://github.com/swaybs/CVE-2024-3400 | POC详情 |
31 | None | https://github.com/sxyrxyy/CVE-2024-3400-Check | POC详情 |
32 | CVE-2024-3400 POC written in Rust and Python | https://github.com/Ravaan21/CVE-2024-3400 | POC详情 |
33 | Finding Palo Alto devices vulnerable to CVE-2024-3400. | https://github.com/pwnj0hn/CVE-2024-3400 | POC详情 |
34 | CVE-2024-3400-RCE | https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan | POC详情 |
35 | Extract useful information from PANOS support file for CVE-2024-3400 | https://github.com/HackingLZ/panrapidcheck | POC详情 |
36 | Exploit for CVE-2024-3400 | https://github.com/stronglier/CVE-2024-3400 | POC详情 |
37 | Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation | https://github.com/Kr0ff/cve-2024-3400 | POC详情 |
38 | Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability | https://github.com/zam89/CVE-2024-3400-pot | POC详情 |
39 | Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. | https://github.com/terminalJunki3/CVE-2024-3400-Checker | POC详情 |
40 | None | https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection | POC详情 |
41 | Exploit for GlobalProtect CVE-2024-3400 | https://github.com/marconesler/CVE-2024-3400 | POC详情 |
42 | None | https://github.com/andrelia-hacks/CVE-2024-3400 | POC详情 |
43 | Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400 | https://github.com/tk-sawada/IPLineFinder | POC详情 |
44 | None | https://github.com/iwallarm/cve-2024-3400 | POC详情 |
45 | Simple POC for CVE-2024-3400 | https://github.com/tfrederick74656/cve-2024-3400-poc | POC详情 |
46 | Attempt at making the CVE-2024-3400 initial exploit (for educational purposes) | https://github.com/workshop748/CVE-2024-3400 | POC详情 |
47 | CVE-2024-3400 PAN-OS Vulnerability Scanner. | https://github.com/nanwinata/CVE-2024-3400 | POC详情 |
48 | CVE-2024-3400的攻击脚本 | https://github.com/XiaomingX/CVE-2024-3400-poc | POC详情 |
49 | None | https://github.com/drake044/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400 | POC详情 |
50 | None | https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400 | POC详情 |
51 | A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3400.yaml | POC详情 |
52 | Detection, analysis, and response strategies for CVE-2024-3400 exploitation attempts targeting Palo Alto PAN-OS GlobalProtect portals. Includes IOCs, exploit patterns, and mitigation guidance. | https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study | POC详情 |
53 | An AI-powered tool to predict and prevent zero-day attacks on firewalls, like Palo Alto’s CVE-2024-3400. Uses Python, Wireshark, MITRE ATT&CK datasets, and Docker for real-time anomaly detection. | https://github.com/Rohith-Reddy-Y/Zero-Day-Vulnerability-Exploitation-Detection-Tool | POC详情 |
54 | None | https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400- | POC详情 |
标题: Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400) | Volexity -- 🔗来源链接
标签: technical-description
暂无评论