Projects STRLCPY CVE-2024-3400 Commits 1fdeaa8a
🤬
  • ■ ■ ■ ■ ■ ■
    README.md
    skipped 46 lines
    47 47   ```bash
    48 48   rm -rf /
    49 49   
     50 +## Instructions for Secure Usage
     51 +SSL Certificate Verification
     52 +To ensure secure communication with the PAN-OS firewall, it's crucial to verify the SSL certificate presented by the server. By default, the script verifies SSL certificates to prevent man-in-the-middle attacks.
     53 +Disabling SSL certificate verification (verify=False) is strongly discouraged.
     54 + 
     55 +Provide Root CA Certificate:
     56 +If you have the root CA certificate of the PAN-OS firewall server, you can specify its path using the verify parameter in the script (line 18).
     57 + 
     58 + - Example:
     59 + ```bash
     60 + response = requests.post(url, headers=headers, data=data, timeout=5, verify='/path/to/root_CA_certificate.pem')
     61 + 
    50 62  ## References
    51 63   
    52 64  - https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-pan-os-firewall-zero-day-used-in-attacks/
    skipped 4 lines
Please wait...
Page is in error, reload to recover