Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create CVE-2024-3400.yaml #9594

Merged
merged 5 commits into from
Apr 18, 2024

Conversation

S4lt5
Copy link
Contributor

@S4lt5 S4lt5 commented Apr 17, 2024

Template / PR Information

Template Validation

I've validated this template locally?

  • YES
  • NO

Additional Details (leave it blank if not applicable)

Having run this on a lot of real world devices, I got a lot of negatives/passes on globalprotects based on:

  • lack of ability to make outbound connections/exfil
  • The fact that the /session/minute timer was on a longer timer such as 5min+ and that it would time out during the nuclei run.

The amount of hits I got via the file write, versus the existing template were greater than 10:1.

If you are looking for unpatched globalprotects, this should do the trick and be more reliable. Some of the positive hits you will get from this may be fully vulnerable to RCE as well, but it just takes some time, etc.

I'm not sure how to name this template, but I have validated it across a fairly wide set of devices.

Additional References:

@S4lt5
Copy link
Contributor Author

S4lt5 commented Apr 17, 2024

I don't really know how to classify this, based on my real world experience this should show who is not patched to CVE-2024-3400 when there are mitigating factors to the interact-sh routine.

"In the wild" i have seen sites that take 5 mins or longer to call back after the payload is made, which passed the other script and may lead to false negatives.

@S4lt5
Copy link
Contributor Author

S4lt5 commented Apr 17, 2024

@ehsandeep it looks good, I did some spot checks and seems to work well.

@ehsandeep ehsandeep changed the title Create CVE-2024-3400-file-write.yaml Create CVE-2024-3400.yaml Apr 17, 2024
@W01fh4cker
Copy link

I don't really know how to classify this, based on my real world experience this should show who is not patched to CVE-2024-3400 when there are mitigating factors to the interact-sh routine.

"In the wild" i have seen sites that take 5 mins or longer to call back after the payload is made, which passed the other script and may lead to false negatives.

You are right, there will be a delay of almost five minutes, causing the original script to not be able to detect it correctly.

@DhiyaneshGeek DhiyaneshGeek self-assigned this Apr 18, 2024
@DhiyaneshGeek DhiyaneshGeek added the Done Ready to merge label Apr 18, 2024
@GeorginaReeder
Copy link

Looks great, thanks for your contribution @S4lt5 - we appreciate it!

@fullstackpotato
Copy link
Contributor

This newer poc is possibly not CVE-2024-3400, but a currently unassigned vuln in either golang's gorilla/sessions package/PA's own code elsewhere:

@W01fh4cker
Copy link

This newer poc is possibly not CVE-2024-3400, but a currently unassigned vuln in either golang's gorilla/sessions package/PA's own code elsewhere:

You're right, but it can indeed be used to detect CVE-2024-3400

@S4lt5
Copy link
Contributor Author

S4lt5 commented Apr 18, 2024

This newer poc is possibly not CVE-2024-3400, but a currently unassigned vuln in either golang's gorilla/sessions package/PA's own code elsewhere:

This is true, it's not exactly the RCE, but is more of a "You are not patched for 2024-3400" which is why I was not sure how to classify this.

@ehsandeep ehsandeep merged commit ade107c into projectdiscovery:main Apr 18, 2024
2 checks passed
@TheLosingEdge
Copy link

Confirmed this as working
2024-04-19_7-54-13

@schooldropout1337
Copy link

CVE-2024-3400-POC-1

Thanks, got response after modification.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Done Ready to merge
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

8 participants