# PAN-OS:全局保护网关和门户中的反射跨站脚本(XSS)漏洞
N/A
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link.The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0133.yaml | POC详情 |
2 | None | https://github.com/dodiorne/cve-2025-0133 | POC详情 |
3 | CVE-2025-0133 GlobalProtect XSS | https://github.com/ynsmroztas/-CVE-2025-0133-GlobalProtect-XSS | POC详情 |
4 | Palo Alto - Global Protect - Reflected XSS | https://github.com/wiseep/CVE-2025-0133 | POC详情 |
5 | Reflected XSS vulnerability found in Palo Alto GlobalProtect Gateway & Portal. Attackers can inject malicious scripts via crafted requests. | https://github.com/INTELEON404/CVE-2025-0133 | POC详情 |
6 | None | https://github.com/shawarkhanethicalhacker/CVE-2025-0133-exploit | POC详情 |
标题: CVE-2025-0133 PAN-OS: Reflected Cross-Site Scripting (XSS) Vulnerability in GlobalProtect Gateway and Portal -- 🔗来源链接
标签: vendor-advisory
神龙速读暂无评论