关联漏洞
描述
PAN-OS CVE POC SCRIPT
介绍
# CVE-2025-0108 - PAN-OS PoC SCRIPT /!\
> **Disclaimer:** This script is provided 'as is' and exclusively for educational purposes. Users are strongly advised to exercise caution and utilize it within the boundaries of legal and ethical considerations.
## Description
Python vulnerability scanner designed to check for **CVE-2025-0108**, an authentication bypass vulnerability in **Palo Alto Networks' PAN-OS**.
The tool works by sending specially crafted HTTP requests to URLs or a list of URLs to detect if they are vulnerable to the CVE-2025-0108 flaw.
This vulnerability could allow an unauthenticated threat actor to bypass authentication on a vulnerable system.
## Features
- **Single URL Scanning**: Check a single URL for vulnerability.
- **Batch URL Scanning**: Check multiple URLs from a text file.
- **Logging**: Logs results to both the console and a log file (`scan_results.log`).
- **Timeout Handling**: Prevents the script from hanging indefinitely with the `timeout` parameter for HTTP requests.
- **Detailed Reporting**: Outputs detailed information including status codes and responses.
- **Error Handling**: Handles connection issues, timeouts, and other exceptions gracefully.
## Requirements
- Python 3.x
- Requests library (`pip install requests`)
## Usage
```bash
python script.py -u http://example.com
```
```bash
python script.py -f urls.txt
```
## About
[](https://www.python.org/)
[](https://www.python.org/downloads/release/python-360/)
[](https://www.gnu.org/licenses/gpl-3.0)
[](mailto:info@cybersec.sohaib.eu)
文件快照
[4.0K] /data/pocs/a2382ecfda739b2809e14aa7da14fb68c319b01c
├── [3.3K] CVE_2025_0108_V1.py
├── [ 34K] LICENSE
└── [1.8K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。