Palo Alto Networks OS (PAN-OS) Remote Code Execution Exploit

An authentication bypass in Palo Alto Networks PAN-OS software(CVE-2024-0012) enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perform administrative actions. A privilege escalation vulnerability in Palo Alto Networks PAN-OS software(CVE-2024-9474) allows a PAN-OS administrator with access to the management web interface to perform actions on the firewall with root privileges. This module exploits these two vulnerabilities CVE-2024-0012 and CVE-2024-9474 in order to deploy an agent. The exploit does the following steps: Send a request containing a header parameter for authentication bypass(CVE-2024-0012) to inject a command within a 'user' request body parameter(CVE-2024-9474) and receive an elevated user session ID in the response, whereby the injected command is written to a local session cache file. Send a request with the elevated session ID to trigger evaluation of the injected local session cache file. Repeat the process with all the necessary commands to deploy an agent.
Product Name