nomisec
WORKING POC
161 stars
by h4x0r-dz · poc
https://github.com/h4x0r-dz/CVE-2024-3400
The repository provides a functional proof-of-concept for CVE-2024-3400, demonstrating an OS command injection vulnerability in Palo Alto GlobalProtect. It includes HTTP request examples that exploit a path traversal and command injection flaw in the `/ssl-vpn/hipreport.esp` endpoint, allowing arbitrary file creation and command execution with root privileges.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (PAN-OS)
No auth needed
Prerequisites:
Network access to the vulnerable endpoint · No authentication required
nomisec
WORKING POC
90 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan
This repository contains a functional exploit for CVE-2024-3400, a command injection vulnerability in Palo Alto GlobalProtect. The script crafts a malicious HTTP request with a base64-encoded command in the Cookie header to trigger RCE and verifies exploitation by checking for a created file.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (PAN-OS)
No auth needed
Prerequisites:
Target must be running vulnerable Palo Alto GlobalProtect · Network access to the target
nomisec
WORKING POC
72 stars
by 0x0d3ad · poc
https://github.com/0x0d3ad/CVE-2024-3400
The repository contains a functional exploit for CVE-2024-3400, demonstrating an OS command injection vulnerability in Palo Alto Networks' SSL VPN (hipreport.esp endpoint). The exploit generates a reverse shell via a crafted curl command with base64-encoded payload injection.
Classification
Working Poc 95%
Target:
Palo Alto Networks SSL VPN (specific version not specified)
No auth needed
Prerequisites:
Vulnerable Palo Alto Networks SSL VPN instance · Network access to target · Listener for reverse shell
nomisec
WORKING POC
30 stars
by ihebski · remote
https://github.com/ihebski/CVE-2024-3400
The repository contains a functional exploit for CVE-2024-3400, a command injection vulnerability in Palo Alto Networks PAN-OS. It includes a Nuclei template and HTTP request examples to test for path traversal and RCE via crafted SESSID cookies.
Classification
Working Poc 95%
Target:
Palo Alto Networks PAN-OS (GlobalProtect feature)
No auth needed
Prerequisites:
Telemetry must be enabled for RCE · Target must be running vulnerable PAN-OS version
nomisec
WORKING POC
14 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-3400
This repository contains a functional Python exploit for CVE-2024-3400, targeting a directory traversal vulnerability in Palo Alto Networks devices to achieve remote code execution (RCE). The exploit includes both single-target and bulk-scanning capabilities, with reverse shell functionality.
Classification
Working Poc 95%
Target:
Palo Alto Networks GlobalProtect SSL VPN
No auth needed
Prerequisites:
Network access to target device · Python 3.x with required libraries (requests, rich, pwncat-vl, alive_progress)
nomisec
BACKDOOR: TROJAN
13 stars
by momika233 · poc
https://github.com/momika233/CVE-2024-3400
The repository contains a malicious Python script that writes a base64-encoded payload to a system file, which executes arbitrary code. The payload is obfuscated and includes functionality to delete itself and other system files, indicating deceptive intent.
Classification
Trojan 95%
Target:
Palo Alto Networks PAN-OS (CVE-2024-3400)
No auth needed
Prerequisites:
Access to the target system's file system · Python 3.6 environment
nomisec
WORKING POC
11 stars
by Yuvvi01 · poc
https://github.com/Yuvvi01/CVE-2024-3400
This repository contains a functional Python exploit for CVE-2024-3400, a command injection vulnerability in Palo Alto Networks PAN-OS GlobalProtect. The exploit sends a crafted XML payload to the firewall's API endpoint to achieve remote code execution.
Classification
Working Poc 90%
Target:
Palo Alto Networks PAN-OS (specific versions affected by CVE-2024-3400)
No auth needed
Prerequisites:
Network access to the vulnerable PAN-OS firewall · GlobalProtect feature enabled with specific configurations
nomisec
WORKING POC
9 stars
by ak1t4 · remote
https://github.com/ak1t4/CVE-2024-3400
This repository contains a functional exploit script for CVE-2024-3400, a file write vulnerability in Palo Alto GlobalProtect. The script automates the process of identifying vulnerable instances and writing arbitrary files via crafted HTTP requests.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (specific version not specified)
No auth needed
Prerequisites:
List of target URLs · httpx tool installed
nomisec
SCANNER
7 stars
by AdaniKamal · poc
https://github.com/AdaniKamal/CVE-2024-3400
The repository contains a Python script that scans for PAN-OS versions by analyzing HTTP response headers from static resources, but does not include exploit code for CVE-2024-3400. It relies on a version table to infer software versions.
Classification
Scanner 95%
Target:
Palo Alto PAN-OS (GlobalProtect)
No auth needed
Prerequisites:
Network access to the target PAN-OS interface · version-table.txt file
nomisec
WORKING POC
6 stars
by 0xr2r · remote
https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
This repository contains a functional proof-of-concept for CVE-2024-3400, demonstrating an OS command injection vulnerability in Palo Alto GlobalProtect. The exploit leverages a path traversal in the SESSID cookie to write a file to the filesystem with root privileges.
Classification
Working Poc 90%
Target:
Palo Alto GlobalProtect (PAN-OS)
No auth needed
Prerequisites:
Network access to the vulnerable GlobalProtect portal
nomisec
WORKING POC
6 stars
by zam89 · poc
https://github.com/zam89/CVE-2024-3400-pot
This repository contains a functional exploit PoC for CVE-2024-3400, targeting Palo Alto Networks GlobalProtect. The exploit simulates a malicious server that logs and captures suspicious requests, including directory traversal and command injection attempts in cookies.
Classification
Working Poc 90%
Target:
Palo Alto Networks GlobalProtect
No auth needed
Prerequisites:
Network access to the target GlobalProtect instance · Ability to intercept or redirect traffic to the malicious server
nomisec
WORKING POC
5 stars
by schooldropout1337 · remote
https://github.com/schooldropout1337/CVE-2024-3400
This repository contains functional exploit code for CVE-2024-3400, a command injection vulnerability in Palo Alto Networks PAN-OS. The exploit leverages arbitrary file creation and OS command injection via crafted HTTP requests to achieve remote code execution with root privileges.
Classification
Working Poc 95%
Target:
Palo Alto Networks PAN-OS (specific versions with GlobalProtect feature)
No auth needed
Prerequisites:
Target must have GlobalProtect feature enabled · Specific PAN-OS versions affected by CVE-2024-3400
nomisec
WORKING POC
5 stars
by retkoussa · remote
https://github.com/retkoussa/CVE-2024-3400
This repository contains a functional PoC for CVE-2024-3400, a command injection vulnerability in Palo Alto GlobalProtect. The exploit leverages a path traversal in the `SESSID` cookie to write a file to the server and verify its presence, confirming vulnerability.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (PAN-OS)
No auth needed
Prerequisites:
Network access to the target GlobalProtect portal · SSL/TLS connectivity to the target
nomisec
WORKING POC
2 stars
by ZephrFish · remote
https://github.com/ZephrFish/CVE-2024-3400-Canary
The PoC exploits CVE-2024-3400 by injecting a command into the SESSID cookie, which is then decoded and executed via a base64-encoded payload. The exploit targets a command injection vulnerability in the GlobalProtect login endpoint.
Classification
Working Poc 95%
Target:
Palo Alto Networks GlobalProtect (specific version not specified)
No auth needed
Prerequisites:
Network access to the target GlobalProtect portal
nomisec
STUB
2 stars
by CerTusHack · poc
https://github.com/CerTusHack/CVE-2024-3400-PoC
The repository contains a Docker setup script for a Palo Alto firewall environment but lacks any actual exploit code or technical details about CVE-2024-3400. It references a non-existent 'exploit.py' script.
Target:
Palo Alto Firewall (PAN-OS)
No auth needed
Prerequisites:
Docker installed · Internet connection
nomisec
SCANNER
2 stars
by HackingLZ · poc
https://github.com/HackingLZ/panrapidcheck
This repository contains a Python script designed to parse Palo Alto Networks support files for indicators of compromise (IoCs) related to CVE-2024-3400. It extracts logs and searches for patterns associated with the vulnerability, such as unmarshal errors and known malicious IPs/hosts.
Classification
Scanner 95%
Target:
Palo Alto Networks PAN-OS
No auth needed
Prerequisites:
Access to a Palo Alto Networks support file (tech support archive)
nomisec
WORKING POC
2 stars
by marconesler · remote
https://github.com/marconesler/CVE-2024-3400
This repository contains a functional Python exploit for CVE-2024-3400, targeting Palo Alto GlobalProtect firewalls with telemetry enabled. The exploit leverages command injection via a maliciously crafted session cookie to achieve remote code execution (RCE) or configuration file exfiltration.
Classification
Working Poc 95%
Target:
Palo Alto PAN-OS (GlobalProtect)
No auth needed
Prerequisites:
Vulnerable PAN-OS version · Telemetry enabled on the firewall
nomisec
SCANNER
2 stars
by swaybs · poc
https://github.com/swaybs/CVE-2024-3400
This repository contains a Python script that checks for evidence of CVE-2024-3400 exploitation on Palo Alto Networks firewalls by searching for specific log patterns. It does not exploit the vulnerability but scans for indicators of compromise.
Classification
Scanner 95%
Target:
Palo Alto Networks PAN-OS
Auth required
Prerequisites:
Valid credentials for the target firewall · Network access to the firewall · Python 3.6+ with netmiko and tqdm libraries
nomisec
WRITEUP
1 stars
by hashdr1ft · remote
https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400
This repository provides a detailed walkthrough of investigating and responding to a Palo Alto Networks PAN-OS command injection vulnerability (CVE-2024-3400). It includes step-by-step analysis, log inspection, and incident response procedures but does not contain functional exploit code.
Classification
Writeup 90%
Target:
Palo Alto Networks PAN-OS
No auth needed
Prerequisites:
Access to vulnerable PAN-OS instance · Network connectivity to target
nomisec
WORKING POC
1 stars
by CONDITIONBLACK · remote
https://github.com/CONDITIONBLACK/CVE-2024-3400-POC
This repository contains a functional Python script that tests for CVE-2024-3400, a remote code execution vulnerability in Palo Alto Networks GlobalProtect portals. The script crafts a malicious cookie payload with a base64-encoded command and checks for command execution by analyzing the HTTP response.
Classification
Working Poc 95%
Target:
Palo Alto Networks GlobalProtect (Pan-OS)
No auth needed
Prerequisites:
Target URLs list · Network access to vulnerable GlobalProtect portal
gitlab
SCANNER
by tdubiel1 · poc
https://gitlab.com/tdubiel1/simple-ansible-for-cve-2024-3400
This repository contains Ansible playbooks to detect if a Palo Alto Networks firewall is vulnerable to CVE-2024-3400 and to apply mitigations (disabling telemetry) and upgrades. It does not include exploit code but provides automation for vulnerability assessment and remediation.
Classification
Scanner 90%
Target:
Palo Alto Networks PAN-OS (versions 10.2, 11.0, 11.1)
Auth required
Prerequisites:
Ansible with Palo Alto Networks collection · Valid credentials for the PAN-OS device · API access to the firewall
nomisec
SCANNER
by index2014 · remote
https://github.com/index2014/CVE-2024-3400-Checker
This repository contains a Python-based scanner for detecting CVE-2024-3400, a Palo Alto PAN-OS unauthenticated command injection vulnerability. It checks for vulnerability by attempting to write a file via a crafted cookie and verifying its existence.
Classification
Scanner 95%
Target:
Palo Alto PAN-OS
No auth needed
Prerequisites:
Network access to the target PAN-OS device
nomisec
WORKING POC
by codeblueprint · remote
https://github.com/codeblueprint/CVE-2024-3400
This Python script tests for CVE-2024-3400 by attempting an arbitrary file upload to a Palo Alto device via a crafted POST request with a manipulated Cookie header. It verifies vulnerability by checking if the uploaded file can be retrieved.
Classification
Working Poc 90%
Target:
Palo Alto GlobalProtect
No auth needed
Prerequisites:
Network access to the target Palo Alto device
nomisec
WORKING POC
by Kr0ff · remote
https://github.com/Kr0ff/cve-2024-3400
This repository contains a functional Python exploit for CVE-2024-3400, a command injection vulnerability in Palo Alto GlobalProtect. The exploit includes both a vulnerability checker and a command execution module, leveraging cookie manipulation to achieve arbitrary command execution.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (specific versions affected by CVE-2024-3400)
No auth needed
Prerequisites:
Network access to the target Palo Alto GlobalProtect interface · Target must be vulnerable to CVE-2024-3400
nomisec
WORKING POC
by andrelia-hacks · remote
https://github.com/andrelia-hacks/CVE-2024-3400
This repository contains a functional exploit for CVE-2024-3400, a command injection vulnerability in Palo Alto GlobalProtect. The exploit uses a crafted SESSID cookie to execute arbitrary commands via the `hipreport.esp` endpoint, leading to remote code execution (RCE) and configuration file exfiltration.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (PAN-OS)
No auth needed
Prerequisites:
Network access to the target GlobalProtect portal · Python environment with `requests` and `rich` libraries
nomisec
WORKING POC
by workshop748 · remote
https://github.com/workshop748/CVE-2024-3400
This repository contains a functional exploit for CVE-2024-3400, targeting Palo Alto Networks GlobalProtect VPN. The exploit leverages command injection via a crafted SESSID cookie to execute a reverse shell, demonstrating remote code execution (RCE).
Classification
Working Poc 95%
Target:
Palo Alto Networks GlobalProtect VPN (specific version not specified)
No auth needed
Prerequisites:
Network access to the target GlobalProtect VPN interface · Target system must be vulnerable to CVE-2024-3400
nomisec
SCANNER
by nanwinata · remote
https://github.com/nanwinata/CVE-2024-3400
This repository contains a Python script that scans for CVE-2024-3400, a command injection vulnerability in PAN-OS. It uses external tools like httpx and subfinder to enumerate subdomains and check for vulnerability by sending a crafted request with a malicious cookie.
Classification
Scanner 95%
Target:
PAN-OS versions < 11.1.2-h3
No auth needed
Prerequisites:
httpx · subfinder · target domain or subdomain list
nomisec
WORKING POC
by LoanVitor · poc
https://github.com/LoanVitor/CVE-2024-3400-
This repository contains a functional Go exploit for CVE-2024-3400, a command injection vulnerability in Palo Alto Networks' PAN-OS. The exploit sends a crafted XML payload to the PAN-OS API endpoint, allowing unauthenticated remote code execution with root privileges.
Classification
Working Poc 95%
Target:
Palo Alto Networks PAN-OS (10.2, 11.0, 11.1 with GlobalProtect Gateway/Portal and device telemetry enabled)
No auth needed
Prerequisites:
Target must have GlobalProtect Gateway/Portal enabled · Device telemetry must be enabled · Network access to the PAN-OS API endpoint
nomisec
SUSPICIOUS
by FoxyProxys · poc
https://github.com/FoxyProxys/CVE-2024-3400
The repository contains only a README with minimal details about CVE-2024-3400, lacking exploit code or technical analysis. It appears to be a placeholder or lure.
Classification
Suspicious 90%
Target:
GlobalProtect Gateway
No auth needed
nomisec
SCANNER
by terminalJunki3 · poc
https://github.com/terminalJunki3/CVE-2024-3400-Checker
This repository contains a Python script designed to scan Palo Alto Networks tech support logs for indicators of compromise related to CVE-2024-3400. It searches for specific terms in log files within a .tar.gz archive but does not exploit the vulnerability.
Classification
Scanner 90%
Target:
Palo Alto Networks PAN-OS
No auth needed
Prerequisites:
Access to a Palo Alto Networks tech support .tar.gz file
nomisec
WRITEUP
by CyberBibs · poc
https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-
This repository provides a detailed technical writeup of the investigation and remediation steps for CVE-2024-3400, a critical command injection vulnerability in Palo Alto Networks PAN-OS. It includes analysis of logs, threat intelligence, and containment strategies, but does not contain functional exploit code.
Classification
Writeup 95%
Target:
Palo Alto Networks PAN-OS (GlobalProtect feature)
No auth needed
Prerequisites:
Access to vulnerable PAN-OS instance · Network connectivity to target
nomisec
SCANNER
by MurrayR0123 · poc
https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
This repository contains a bash script designed to detect indicators of compromise (IOCs) related to CVE-2024-3400 on Palo Alto Firewalls. It checks for exploit attempts in logs, suspicious files, and persistence mechanisms but does not include functional exploit code.
Classification
Scanner 95%
Target:
Palo Alto Firewalls (PAN-OS)
No auth needed
Prerequisites:
Access to the target system's logs and file system
nomisec
WORKING POC
by Ravaan21 · poc
https://github.com/Ravaan21/CVE-2024-3400
The repository contains functional exploit code for CVE-2024-3400, a path traversal vulnerability in Palo Alto GlobalProtect. The PoC sends a crafted request to write a file via a malicious cookie and verifies vulnerability by checking for the file's existence.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (specific versions affected by CVE-2024-3400)
No auth needed
Prerequisites:
Network access to the target GlobalProtect portal · Target must be vulnerable to CVE-2024-3400
nomisec
WRITEUP
by Yafiah-Darwesh · poc
https://github.com/Yafiah-Darwesh/cs50-cyber-paloalto-oauth
The repository provides a technical summary and presentation materials about CVE-2024-3400, detailing a misconfigured OAuth token validation vulnerability that allowed token forging and unauthorized access across multiple OAuth integrations, including Palo Alto, Cloudflare, and Zscaler.
Classification
Writeup 80%
Target:
OAuth integrations (Palo Alto, Cloudflare, Zscaler, etc.)
No auth needed
Prerequisites:
Access to OAuth token validation mechanism
nomisec
WORKING POC
by GhassanSabir · poc
https://github.com/GhassanSabir/CVE-2024-3400-poc
This repository provides a functional proof-of-concept for CVE-2024-3400, a command injection vulnerability in Palo Alto firewalls. It includes HTTP request examples to create files and execute commands via crafted Cookie headers.
Classification
Working Poc 90%
Target:
Palo Alto GlobalProtect firewall
No auth needed
Prerequisites:
Network access to the target firewall · SSL-VPN interface exposed
nomisec
WRITEUP
by CyprianAtsyor · poc
https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study
This repository provides a detailed incident investigation and threat analysis of CVE-2024-3400, a critical unauthenticated command injection vulnerability in Palo Alto Networks PAN-OS. It includes IOCs, exploit patterns, log evidence, and mitigation guidance, but does not contain functional exploit code.
Classification
Writeup 95%
Target:
Palo Alto Networks PAN-OS (10.2, 11.0, 11.1 with GlobalProtect enabled)
No auth needed
Prerequisites:
GlobalProtect gateway enabled · Vulnerable PAN-OS version (10.2.x, 11.0.x, 11.1.x)
nomisec
WORKING POC
by MrR0b0t19 · poc
https://github.com/MrR0b0t19/CVE-2024-3400
This repository contains a functional exploit PoC for CVE-2024-3400, targeting PAN-OS firewalls with GlobalProtect and device telemetry enabled. The exploit leverages a command injection vulnerability to execute arbitrary commands via crafted GET requests.
Classification
Working Poc 90%
Target:
PAN-OS 10.2, 11.0, 11.1
No auth needed
Prerequisites:
GlobalProtect gateway enabled · Device telemetry enabled
nomisec
SCANNER
by sxyrxyy · poc
https://github.com/sxyrxyy/CVE-2024-3400-Check
This repository contains a Python script that checks for CVE-2024-3400 by sending a POST request to `/ssl-vpn/hipreport.esp` with a crafted cookie and then attempting to access a typically forbidden file via a GET request. It does not execute arbitrary code but confirms vulnerability by detecting a 403 bypass.
Classification
Scanner 95%
Target:
Palo Alto GlobalProtect (specific version not specified)
No auth needed
Prerequisites:
Network access to the target · Python 3.6+ with `aiohttp`
nomisec
WORKING POC
by tfrederick74656 · poc
https://github.com/tfrederick74656/cve-2024-3400-poc
This repository contains a functional PoC for CVE-2024-3400, a directory traversal vulnerability in Palo Alto GlobalProtect. The exploit sends a crafted HTTP request with a malicious cookie to read arbitrary files from the server.
Classification
Working Poc 95%
Target:
Palo Alto GlobalProtect (specific versions affected by CVE-2024-3400)
No auth needed
Prerequisites:
Network access to the vulnerable GlobalProtect instance
nomisec
WORKING POC
by pwnj0hn · poc
https://github.com/pwnj0hn/CVE-2024-3400
The repository contains a functional exploit PoC for CVE-2024-3400, which targets Palo Alto Networks devices. The script sends crafted HTTP requests to create and verify a file, confirming vulnerability by checking for specific HTTP status codes.
Classification
Working Poc 95%
Target:
Palo Alto Networks GlobalProtect
No auth needed
Prerequisites:
Network access to the target device
exploitdb
WORKING POC
by Kr0ff · textremotelinux_x86-64
https://www.exploit-db.com/exploits/51996
This exploit leverages a command injection vulnerability in Palo Alto PAN-OS by manipulating the SESSID cookie to execute arbitrary commands via a crafted HTTP request. It includes both a vulnerability check and an exploitation module.
Classification
Working Poc 95%
Target:
Palo Alto PAN-OS < v11.1.2-h3 and other specified versions
No auth needed
Prerequisites:
Network access to the target · Target running vulnerable PAN-OS version
metasploit
WORKING POC
EXCELLENT
by remmons-r7, sfewer-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_telemetry_cmd_exec.rb
This Metasploit module exploits CVE-2024-3400, an unauthenticated remote code execution vulnerability in Palo Alto Networks PAN-OS. It leverages arbitrary file creation and command injection via malformed session cookies, with payload execution triggered by the telemetry service.
Classification
Working Poc 100%
Target:
Palo Alto Networks PAN-OS (specific versions listed in description)
No auth needed
Prerequisites:
GlobalProtect Gateway or Portal enabled · Telemetry collection enabled (default)