Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-2038 PoC — PAN-OS: OS command injection vulnerability in the management web interface

Source
Associated Vulnerability
Title:PAN-OS: OS command injection vulnerability in the management web interface (CVE-2020-2038)
Description:An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges. This issue impacts: PAN-OS 9.0 versions earlier than 9.0.10; PAN-OS 9.1 versions earlier than 9.1.4; PAN-OS 10.0 versions earlier than 10.0.1.
Description
Exploit to capitalize on vulnerability CVE-2020-2038.
Readme
# CVE-2020-2038
Exploit to capitalize on vulnerability CVE-2020-2038.

According to Palo Alto Networks:
_An OS Command Injection vulnerability in the PAN-OS management interface that allows authenticated administrators to execute arbitrary OS commands with root privileges._

This issue impacts:<br />
PAN-OS 9.0 versions earlier than 9.0.10<br />
PAN-OS 9.1 versions earlier than 9.1.4<br />
PAN-OS 10.0 versions earlier than 10.0.1<br />

# Demo
[![demo](https://raw.githubusercontent.com/und3sc0n0c1d0/CVE-2020-2038/main/demo.gif)]

# Credits
All credits go to Mikhail Klyuchnikov and Nikita Abramov of Positive Technologies who are the researchers who discovered this vulnerability.
More info: <a href="https://swarm.ptsecurity.com/swarm-of-palo-alto-pan-os-vulnerabilities/" target="_blank">https://swarm.ptsecurity.com/swarm-of-palo-alto-pan-os-vulnerabilities/</a>
File Snapshot

[4.0K] /data/pocs/48a1c0bfcb85c524ed4db39a724880d021854c73 ├── [2.6K] CVE-2020-2038.py ├── [755K] demo.gif ├── [ 872] README.md └── [ 19] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →