关联漏洞
描述
CVE-2024-3400-RCE
介绍
# Cyberspace Mapping Dork
## Fofa
```
app="paloalto-GlobalProtect"
```
https://en.fofa.info/result?qbase64=YXBwPSJwYWxvYWx0by1HbG9iYWxQcm90ZWN0Ig%3D%3D
## Zoomeye
```
app:"Palo Alto Networks firewall httpd"
```
https://www.zoomeye.hk/searchResult?q=app%3A%22Palo%20Alto%20Networks%20firewall%20httpd%22&from=5o6o54m5MjQwNDE0MDE=
## Hunter.how
```
product.name="GlobalProtect Portal"
```
https://hunter.how/list?searchValue=product.name%3D%22GlobalProtect%20Portal%22
## Shodan
```
http.favicon.hash:-631559155
```
# How-To-Use
scan `urls.txt`:
```powershell
python CVE-2024-3400-RCE-CHECK.py -f urls.txt -p http://127.0.0.1:8083 -t 100
```

# Reference
https://github.com/h4x0r-dz/CVE-2024-3400
https://attackerkb.com/topics/SSTk336Tmf/cve-2024-3400/rapid7-analysis
https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
文件快照
[4.0K] /data/pocs/9e916c8fe956aad3958fff46c35057f7dbbef6cd
├── [3.7K] CVE-2024-3400-RCE-CHECK.py
├── [1.0K] LICENSE
└── [ 967] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。