关联漏洞
介绍
# SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-
# Introduction
CVE‑2024‑3400 is a critical (CVSS 10.0) command‑injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN‑OS, first disclosed on April 12, 2024
github.com+10
## Investigation & Remediation
To investigate and remediate the alert, I took the following steps;
- Check SOC ticket queue & Take ownership of an Alert
- Create case
- Understanding the attack
- Detection
- Analysis
- Containment
- Remediation
- Report Artifacts & IOCs
- Close ticket
These steps are expalined in details below with images.
## Step 1: Checking SOC Ticket Queue
The Security Operations Center (SOC) ticket queue is a critical component in managing and responding to cybersecurity incidents. The reasons are Incident Tracking and Management, Prioritization and Triage, Accountability, Reporting, Trend Analysis, and Compliance and Audit Readiness.
Each ticket in the queue is typically assigned to a specific analyst or team, ensuring clear responsibility and accountability for incident resolution. This fosters a structured and organized approach to incident management. I took ownership of the Alert with EventID: 263
<p align="center">
<img src="images/1.png" alt="SOC Main Page">
</p>
<p align="center">
<img src="images/2.png" alt="Taking Ownership">
</p>
## Step 2: Creating a Case
Upon taking ownership of the alert, it is automatically sent to the investigation channel, where I can initiate a case to further analyze and respond to the security incident. I created a case for the alert and was able to veiw details of the incident.
<p align="center">
<img src="images/3.png" alt="Taking Ownership">
</p>
## Step 3: Detection
Based on the information that the alert provided, it appears that there is a suspicious Web Attack detected on a Firewall named “PA-Firewall-01” with an IP address of 172.16.17.139. The Alert is triggered by the SOC274 for Palo Alto Networks PAN-OS Command Injection Vulnerability Exploitation (CVE-2024-3400)
<p align="center">
<img src="images/4.png" alt="Taking Ownership">
</p>
To better understand this alert, I carried out some Open-Source Intelligence (OSINT) as regards the reported CVE-2024-3400 and important information relating to the CVE.
<p align="center">
<img src="images/5.png" alt="Taking Ownership">
</p>
Next, I carried out threat intelligence using the threat Intelligence platform provided by LetsDefend which provides a comprehensive database dedicated to cataloging maliciously used information, such as IP addresses, domains, and other indicators of compromise using the source IP address of 144.172.79.92.
<p align="center">
<img src="images/6.png" alt="Taking Ownership">
</p>
Additionally, I used VirusTotal for threat intelligence on the same IP address and observed that the malware was flaged for malicious activities by 10 security vendors and the Geolocation of the IP is UNITED STATES.
<p align="center">
<img src="images/7.png" alt="Taking Ownership">
</p>
This confirms that the traffic from the IP 144.172.79.92 is Malicious. Hence, the need for me to carry out further investigation by analyzing the logs to see how many hosts in my network have ahd any communication with this malicious IP.
## Step 4: Analysis
I started my analysis by investigating the access logs. Focusing on IP addresses, user-agents, paths, HTTP status codes, and timestamps to help me identify any suspicious or malicious activity.
Before examining the HTTP traffic, I investigated the payloads used in exploiting the relevant vulnerability. I found this publicly available POC (Proof of Concept) used by [CVE-2024–24919] in this github repository https://github.com/seed1337/CVE-2024-24919-POC/blob/main/exploit.py
<p align="center">
<img src="images/8.png" alt="Taking Ownership">
</p>
Next, I proceeded to the log management page and filtered by log by the malicious source IP address 203.160.68.12 to see how many host have been in contact with it. Upon searching the network, I discovered only the host named “CP-Spark-Gateway-01” with an IP address of 172.16.20.146 has been in contact the the malicious IP.
<p align="center">
<img src="images/9.png" alt="Taking Ownership">
</p>
The Log information below, shows that the malicious IP address 172.16.20.146 used the POST method to send the malicious payload aCSHELL/../../../../../../../../../../etc/shadow — which attempts to read the sensitive /etc/shadow file via directory traversal on the host “CP-Spark-Gateway-01” with an IP address of 172.16.20.146 on 06/June/2024.
<p align="center">
<img src="images/10.png" alt="Taking Ownership">
</p>
<p align="center">
<img src="images/11.png" alt="Taking Ownership">
</p>
The /etc/shadow file is a critical file in Unix/Linux based operating systems that stores hashed passwords and account expiration details for user accounts. Hence, I can conclude that the attcker is trying to steal user credentials and that the request was granted with 200 status code as noticed in the log above.
This further proves that the attck is malicious.
<p align="center">
<img src="images/12.png" alt="Taking Ownership">
</p>
## Step 5: Containment
Containment plays a pivotal role in cybersecurity by limiting the impact of security incidents, protecting data and operations, facilitating effective incident response, preserving evidence for forensic analysis, and ensuring compliance with legal and regulatory requirements.
Since I have detected that the device is compromised, I proceeded to isolated the device "CP-Spark-Gateway-01” with an IP address of 172.16.20.146 to prevent further damages.
<p align="center">
<img src="images/13.png" alt="Taking Ownership">
</p>
<p align="center">
<img src="images/14.png" alt="Taking Ownership">
</p>
## Step 6: Remediation
Remediation is a fundamental component of a robust cybersecurity strategy. It involves fixing vulnerabilities and addressing security issues to prevent exploitation, protect data, maintain operations, and comply with regulations, ultimately contributing to a more secure and resilient organization. To remediate and prevent furture re occurence, the following steps should be taken;
- Apply security patches or updates to address the CVE-2024–24919 vulnerability on our server “CP-Spark-Gateway-01” to eliminate the attack vector.
- Configure/write firewall rules to deny/block traffic from the malicious IP address 203.160.68.12
- If a Security Gateway / Cluster is configured to use an LDAP Account Unit, I recommend changing the password of the LDAP account.
## Step 7: Report Artifacts & IOCs
After completing the analysis, I documented my findings in the “Analyst Note” section.
<p align="center">
<img src="images/15.png" alt="Taking Ownership">
</p>
## Step : Closing the Alert
After concluding my investigation, I concluded that the alert is a true positive. I drafted a closing note explaining the cause of the alert, the steps i took to analyse the alert, the outcome of the analyses, step taken to remediate the alert and successfully close the alert.
<p align="center">
<img src="images/16.png" alt="Taking Ownership">
</p>
文件快照
[4.0K] /data/pocs/4eb635c837dd0dbfa129a5eca81749cd1264c8d1
├── [4.0K] images
└── [7.1K] README.md
1 directory, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。