# Expedition:SQL注入导致防火墙管理员凭证泄露
## 概述
Palo Alto Networks Expedition中存在一个SQL注入漏洞,允许未经身份验证的攻击者泄露Expedition数据库内容,包括密码哈希、用户名、设备配置和设备API密钥。此外,攻击者还可以在Expedition系统上创建和读取任意文件。
## 影响版本
未提供具体受影响版本信息。
## 细节
该SQL注入漏洞允许攻击者执行以下操作:
- 泄露数据库内容,例如密码哈希、用户名、设备配置及设备API密钥。
- 创建和读取Expedition系统上的任意文件。
## 影响
- 数据泄露:攻击者可以获取敏感信息,如密码哈希和配置信息。
- 系统文件操作:攻击者能够在系统中创建和读取任意文件,可能导致系统被进一步控制或破坏。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Proof of Concept Exploit for CVE-2024-9465 | https://github.com/horizon3ai/CVE-2024-9465 | POC详情 |
2 | Checkpoint SQL Injection via Time-Based Attack (CVE-2024-9465) | https://github.com/mustafaakalin/CVE-2024-9465 | POC详情 |
3 | Proof of Concept Exploit for CVE-2024-9465 | https://github.com/XiaomingX/cve-2024-9465-poc | POC详情 |
4 | CVE-2024-9465 Proof of Concept | https://github.com/Farzan-Kh/CVE-2024-9465 | POC详情 |
5 | An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9465.yaml | POC详情 |
6 | Checkpoint SQL Injection via Time-Based Attack (CVE-2024-9465) | https://github.com/Qlng/CVE-2024-9465 | POC详情 |
标题: PAN-SA-2024-0010 Expedition: Multiple Vulnerabilities in Expedition Lead to Exposure of Firewall Credentials -- 🔗来源链接
标签: vendor-advisory
神龙速读标题: Palo Alto Expedition: From N-Day to Full Compromise | Horizon3.ai -- 🔗来源链接
标签: exploit
暂无评论