关联漏洞
介绍
# CVE-2025-0133 Reflected XSS Detection Tool
**Author**: Derek Odiorne
**Date**: 2025-05-23
**Severity**: Medium
**Tested Against**: Palo Alto Networks GlobalProtect Portal (PAN-OS)
---
## 📌 Summary
This script performs **safe, authorized testing** for the vulnerability **CVE-2025-0133**, a reflected Cross-Site Scripting (XSS) issue in the **GlobalProtect portal and gateway login pages** of Palo Alto Networks' PAN-OS software.
The tool tests multiple common parameters with two context-specific payloads:
- **HTML context** (`<script>alert()</script>`)
- **JavaScript string context** (`j\";-alert()...`)
The results are colorized for clarity and saved in a timestamped log file.
---
## 🚨 Vulnerability Overview
- **CVE ID**: [CVE-2025-0133](https://security.paloaltonetworks.com/CVE-2025-0133)
- **Component**: PAN-OS (GlobalProtect Portal / Gateway)
- **Vulnerability**: Reflected XSS
- **Impact**: JavaScript execution in the context of an authenticated user
- **Exploit Method**: Maliciously crafted query parameter in a login URL
---
## 🧪 Usage
### Prerequisites
- Python 3.x
- `requests`
- `colorama`
Install dependencies (if needed):
```bash
pip install requests colorama
文件快照
[4.0K] /data/pocs/9983334beaf971a6a6b694134b1d540b07ee583d
├── [3.8K] cve-2025-0133.py
├── [ 34K] LICENSE
└── [1.2K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。