POC详情: d351046d25c94033736c162112f02ff35e34e903

来源
关联漏洞
标题: Palo Alto Networks PAN-OS 安全漏洞 (CVE-2025-0133)
描述:Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一套为其防火墙设备开发的操作系统。 Palo Alto Networks PAN-OS存在安全漏洞,该漏洞源于反射型跨站脚本可能导致钓鱼攻击。
描述
CVE-2025-0133 Exploit
介绍
# CVE-2025-0133
CVE-2025-0133 Exploit
CVE-2025-0133 is a reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software. An authenticated user with access to the Captive Portal can be tricked into clicking a specially crafted link, leading to the execution of arbitrary JavaScript in the context of their browser. This could result in session hijacking, credential theft, or other client-side attacks.

Severity: Medium (CVSS v3.1 Base Score: 6.1; Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
Affected Versions:

PAN-OS 11.2 < 11.2.7
PAN-OS 11.1 < 11.1.11
PAN-OS 10.2 < 10.2.17


Published: May 14, 2025
Vendor Advisory: Palo Alto Networks Security Advisory
NVD Entry: CVE-2025-0133

Impact:

Execution of malicious JavaScript in the victim's browser.
Potential for phishing, data exfiltration, or further exploitation if combined with other vulnerabilities.
Limited impact on confidentiality for Clientless VPN users due to inherent risks (see PAN-SA-2025-0005).
文件快照

[4.0K] /data/pocs/d351046d25c94033736c162112f02ff35e34e903 ├── [ 878] POC.txt └── [1.0K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。