POC详情: 960b9b826087cced9347041525f83b52b6c223fa

来源
关联漏洞
标题: Palo Alto Networks PAN-OS 命令注入漏洞 (CVE-2024-3400)
描述:Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一款下一代防火墙软件。 Palo Alto Networks PAN-OS 10.2、11.0、11.1存在命令注入漏洞,该漏洞源于GlobalProtect 功能中存在命令注入漏洞,可能使未经身份验证的攻击者在防火墙上以 root权限执行任意代码。
描述
A simple bash script to check for evidence of compromise related to CVE-2024-3400
介绍
# CVE-2024-3400 Compromise Checker
A very simple bash script to check for evidence of compromise related to CVE-2024-3400 on Palo Alto Firewalls.

Designed to provide a quick initial triage of potentially impacted devices by checking for the existence of artefacts outlined in the Volexity writeup and deFroggy's blog post.

Usage: ./cve-2024-3400_checker.sh


For more detailed information regarding the vulnerability itself and the IOCs this script checks for, please check out the respective publications below:
* https://security.paloaltonetworks.com/CVE-2024-3400
* https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/
* https://github.com/deFr0ggy/deFr0ggy.github.io/blob/29806acfdab0b850b8e53542116c6098f498be97/_posts/2024-04-13-Palo%20Alto%20Exploit%20Analysis%20of%20CVE-2024-3400.md#L4

Disclaimer: As public exploits become availabe, the scope of activity is likely to increase and TTPs will almost certainly change. This script may not provide complete detection for all malicious activity and was made with best intentions to allow first responders to perform an initial triage of potentially impacted devices. Further investigation is highly recommended with reference to the technical blog posts above. Please test before running on production systems. The scripts provided here are offered as-is, without warranty of any kind, express or implied. The author assumes no responsibility or liability for any damages or problems resulting from the use of these scripts. Use these scripts at your own risk. By using these scripts, you agree to these terms and conditions.


文件快照

[4.0K] /data/pocs/960b9b826087cced9347041525f83b52b6c223fa ├── [2.7K] cve-2024-3400_checker.sh └── [1.6K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。