关联漏洞
标题:
PAN-OS:管理Web界面身份验证绕过漏洞
(CVE-2025-0108)
描述:在 Palo Alto Networks 的 PAN-OS 软件中存在一个认证绕过漏洞,使得具有访问管理 Web 界面网络权限的未认证攻击者能够绕过 PAN-OS 管理 Web 界面所需的认证,并调用某些 PHP 脚本。尽管调用这些 PHP 脚本不会导致远程代码执行,但它可能对 PAN-OS 的完整性和保密性造成负面影响。
根据我们的推荐最佳实践部署指南(https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431),通过仅将访问管理 Web 界面的权限限制给受信任的内部 IP 地址,可以大大降低该问题的风险。
此问题不影响 Cloud NGFW 或 Prisma Access 软件。
描述
This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems.
介绍
# CVE-2025-0108 Proof of Concept (PoC)
This repository contains a Proof of Concept (PoC) for the **CVE-2025-0108** vulnerability, which is an **authentication bypass** issue in Palo Alto Networks' PAN-OS software. The scripts provided here test for the vulnerability by sending a crafted HTTP request to the target systems.

# CVE-2025-0108 Detection Template 🔍
**Nuclei template for Palo Alto PAN-OS Authentication Bypass (CVE-2025-0108)**
## 📜 Overview
A detection template for an authentication bypass vulnerability in Palo Alto PAN-OS management interface that allows unauthorized access via crafted path traversal requests.
**CVSS 4.0**: 8.8 (Base) / 7.8 (Threat)
**Severity**: High
## 🛠️ Nuclei Usage
```bash
nuclei -t CVE-2025-0108.yaml -u <target-url>
文件快照
[4.0K] /data/pocs/719b00062359a01ba5fbf8daf0b377a8d3d3e79a
├── [ 886] CVE-2025-0108.yaml
├── [1.0K] LICENSE
└── [ 872] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。