POC详情: 719b00062359a01ba5fbf8daf0b377a8d3d3e79a

来源
关联漏洞
标题: PAN-OS:管理Web界面身份验证绕过漏洞 (CVE-2025-0108)
描述:在 Palo Alto Networks 的 PAN-OS 软件中存在一个认证绕过漏洞,使得具有访问管理 Web 界面网络权限的未认证攻击者能够绕过 PAN-OS 管理 Web 界面所需的认证,并调用某些 PHP 脚本。尽管调用这些 PHP 脚本不会导致远程代码执行,但它可能对 PAN-OS 的完整性和保密性造成负面影响。 根据我们的推荐最佳实践部署指南(https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431),通过仅将访问管理 Web 界面的权限限制给受信任的内部 IP 地址,可以大大降低该问题的风险。 此问题不影响 Cloud NGFW 或 Prisma Access 软件。
描述
This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems.
介绍
# CVE-2025-0108 Proof of Concept (PoC)

This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems.

![image](https://github.com/user-attachments/assets/3f3f6868-7f71-428e-9a12-3c53a1ed437f)

# CVE-2025-0108 Detection Template 🔍

**Nuclei template for Palo Alto PAN-OS Authentication Bypass (CVE-2025-0108)**

## 📜 Overview
A detection template for an authentication bypass vulnerability in Palo Alto PAN-OS management interface that allows unauthorized access via crafted path traversal requests.

**CVSS 4.0**: 8.8 (Base) / 7.8 (Threat)  
**Severity**: High  

## 🛠️ Nuclei Usage
```bash
nuclei -t CVE-2025-0108.yaml -u <target-url> 
文件快照

[4.0K] /data/pocs/719b00062359a01ba5fbf8daf0b377a8d3d3e79a ├── [ 886] CVE-2025-0108.yaml ├── [1.0K] LICENSE └── [ 872] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。