# PAN-OS:管理Web界面中的认证绕过漏洞
## 漏洞概述
Palo Alto Networks PAN-OS软件存在一个认证绕过漏洞,使得具备网络访问管理web界面权限的未认证攻击者可以绕过管理web界面所需的身份验证并调用某些PHP脚本。
## 影响版本
此漏洞影响Palo Alto Networks PAN-OS软件,但不影响Cloud NGFW或Prisma Access软件。
## 漏洞细节
攻击者能够绕过PAN-OS管理web界面的身份验证,调用特定的PHP脚本。虽然这不会导致远程代码执行,但可能对PAN-OS的完整性和保密性造成负面影响。
## 影响
此漏洞主要影响PAN-OS软件的完整性和保密性,可通过限制管理web界面访问仅限已信任的内部IP地址来减少风险。建议根据最佳实践部署指南进行部署以提高安全性。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108) | https://github.com/iSee857/CVE-2025-0108-PoC | POC详情 |
2 | This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems. | https://github.com/FOLKS-iwd/CVE-2025-0108-PoC | POC详情 |
3 | Detects an authentication bypass vulnerability in Palo Alto PAN-OS (CVE-2025-0108). | https://github.com/fr4nc1stein/CVE-2025-0108-SCAN | POC详情 |
4 | None | https://github.com/barcrange/PAN-OS-Authentication-Bypass-Checker-CVE-2025-0108- | POC详情 |
5 | None | https://github.com/barcrange/CVE-2025-0108-Authentication-Bypass-checker | POC详情 |
6 | PAN-OS CVE POC SCRIPT | https://github.com/sohaibeb/CVE-2025-0108 | POC详情 |
7 | NSE script that checks for CVE-2025-0108 vulnerability in Palo Alto Networks PAN-OS | https://github.com/becrevex/CVE-2025-0108 | POC详情 |
8 | A vulnerability in PAN-OS management interface allows authentication bypass through path confusion between Nginx and Apache handlers.The issue occurs due to differences in path processing between Nginx and Apache, where double URL encoding combined with directory traversal can bypass authentication checks enforced by X-pan-AuthCheck header. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0108.yaml | POC详情 |
标题: CVE-2025-0108 PAN-OS: Authentication Bypass in the Management Web Interface -- 🔗来源链接
标签: vendor-advisory