Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9464 PoC — Expedition: Authenticated OS Command Injection Vulnerability Leads to Firewall Admin Credential Disclosure

Source
Associated Vulnerability
Title:Expedition: Authenticated OS Command Injection Vulnerability Leads to Firewall Admin Credential Disclosure (CVE-2024-9464)
Description:An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
Description
Proof of Concept Exploit for CVE-2024-9464
Readme
# CVE-2024-9464: Palo Alto Expedition Authenticated Command Injection
Proof of concept to exploit CVE-2024-9464 on vulnerable devices. This script chains the admin reset of CVE-2024-5910 to achieve "unauthenticated" arbitrary command execution.

## Blog Post
Root cause and indicators of compromise here:
[https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/](https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/)

## Usage
```
% python3 CVE-2024-9464.py -h
usage: CVE-2024-9464.py [-h] -u URL -c CMD_FILE [-li LISTEN_IP] [-lp LISTEN_PORT]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     The URL of the target
  -c CMD_FILE, --cmd_file CMD_FILE
                        The commands to execute blind
  -li LISTEN_IP, --listen_ip LISTEN_IP
                        local IP to bind to
  -lp LISTEN_PORT, --listen_port LISTEN_PORT
                        local HTTP port to bind to, for blind RCE mode
```

## Follow the Horizon3.ai Attack Team on Twitter for the latest security research:
*  [Horizon3 Attack Team](https://twitter.com/Horizon3Attack)
*  [James Horseman](https://twitter.com/JamesHorseman2)
*  [Zach Hanley](https://twitter.com/hacks_zach)

## Disclaimer
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

File Snapshot

[4.0K] /data/pocs/f1ee204eef3a9ac1bbac271417c04e74bbb3502f ├── [4.4K] CVE-2024-9464.py └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →