Skip to content

Proof of Concept Exploit for CVE-2024-9464

Notifications You must be signed in to change notification settings

horizon3ai/CVE-2024-9464

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

CVE-2024-9464: Palo Alto Expedition Authenticated Command Injection

Proof of concept to exploit CVE-2024-9464 on vulnerable devices. This script chains the admin reset of CVE-2024-5910 to achieve "unauthenticated" arbitrary command execution.

Blog Post

Root cause and indicators of compromise here: https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/

Usage

% python3 CVE-2024-9464.py -h
usage: CVE-2024-9464.py [-h] -u URL -c CMD_FILE [-li LISTEN_IP] [-lp LISTEN_PORT]

options:
  -h, --help            show this help message and exit
  -u URL, --url URL     The URL of the target
  -c CMD_FILE, --cmd_file CMD_FILE
                        The commands to execute blind
  -li LISTEN_IP, --listen_ip LISTEN_IP
                        local IP to bind to
  -lp LISTEN_PORT, --listen_port LISTEN_PORT
                        local HTTP port to bind to, for blind RCE mode

Follow the Horizon3.ai Attack Team on Twitter for the latest security research:

Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

About

Proof of Concept Exploit for CVE-2024-9464

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages