Share
## https://sploitus.com/exploit?id=4238D95E-7BC4-5D16-86A6-EF0E5C9522D5
# CVE-2025-0108 PAN-OS: Authentication Bypass in the Management Web Interface ๐Ÿ”ฅ

# Description:

An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS. You can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue does not affect Cloud NGFW or Prisma Access software.

# Metrics: 

CVSS 4.0 Severity and Vector Strings:

CNA:  Palo Alto Networks, Inc. CVSS-B 8.8 HIGH ๐Ÿ”ด Vector:  CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Red

CVSS 3.x Severity and Vector Strings:

NIST: NVD Base Score: 9.1 CRITICAL โšซ Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N


# Features:

+ Single URL Scanning: Check a single URL for vulnerability.
+ Batch URL Scanning: Check multiple URLs from a text file.
+ Logging: Logs results to both the console and a log file (scan_results.log).
+ Timeout Handling: Prevents the script from hanging indefinitely with the timeout parameter for HTTP requests.
+ Detailed Reporting: Outputs detailed information including status codes and responses.
+ Error Handling: Handles connection issues, timeouts, and other exceptions gracefully.

# Requirements:

+ Python 3.x
+ Requests library (pip install requests)

# ๐Ÿ› ๏ธ Nuclei Usage:

```
sudo nuclei -t CVE-2025-0108.yaml -u <target-url>
```

# Usage:

```
sudo python3 CVE-2025-0108.py -u http://example.com
```

```
sudo python3 CVE-2025-0108.py -f urls.txt
```

# Disclaimer โš ๏ธ

For educational and research purposes only. Use only against systems you own or have permission to test...