Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2024-3400 PoC — PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

Source
Associated Vulnerability
Title:PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect (CVE-2024-3400)
Description:A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Description
Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. 
Readme
# Palo Vulnerability Check - CVE-2024-3400

## Overview
This script is designed to check for signs of compromise in Palo systems, specifically for the vulnerability identified as CVE-2024-3400. It searches through tech support package `gz` or .tgz archive files for specific log entries that may indicate a security breach.

## Prerequisites
- Python 3.x
- Access to the `.tar.gz` file containing Palo logs.

## Usage
1. Ensure you have a `.tar.gz` tech supprot file containing the relevant Palo logs.
2. Modify the `filepath` variable in the script to point to your `.tar.gz` file.
4. Optional - Update the `search_terms` list with the terms that are indicative of the CVE-2024-3400 vulnerability.
5. Run the script in a Python environment.

## How It Works
- The script will decompress the `.tar.gz` file and search through the specified log files.
- If it finds any of the search terms, it will print the matching lines and advise you to follow remediation guidance and share the files with the vendor.
- If no matches are found, it will print a message indicating that no compromise was detected, but still recommend sharing the file with the vendor for certainty.

## Example
```python
# Replace this with your actual file path
filepath = r'path to techsupport.tgz'
```

## Important Notes
- The script stops searching after finding the first set of matches. If you need a full search, remove the `return` statement after printing matches.
- The script is a basic tool for initial checks and does not replace professional forensic analysis.
- Always ensure you have the latest updates and patches applied to your Palo systems to prevent vulnerabilities like CVE-2024-3400.

## Contributing
If you have suggestions for improving this script or have found a bug, please open an issue or a pull request with your changes.

File Snapshot

[4.0K] /data/pocs/86f46a90146d79ba80bb8aa81987dc04faeb2606 ├── [1.8K] main.py └── [1.8K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →