An authentication bypass in Palo Alto Networks PAN-OS software(CVE-2024-0012) enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions. A privilege escalation vulnerability in Palo Alto Networks PAN-OS software(CVE-2024-9474) allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. This module exploits these two vulnerabilities CVE-2024-0012 and CVE-2024-9474 in order to deploy an agent. The exploit does the following steps: Send a request containing a header parameter for authentication bypass(CVE-2024-0012) to inject a command within a 'user' request body parameter(CVE-2024-9474) and receive an elevated user session ID in the response, whereby the injected command is written to a local session cache file. Send a request with the elevated session ID to trigger evaluation of the injected local session cache file. Repeat the process with all the necessary commands to deploy an agent.
CVE Link
Exploit Type
Product Name