Share
## https://sploitus.com/exploit?id=A5863896-9B12-56E7-9B1C-B7A998AB17C8
# Cyberspace Mapping Dork

## Fofa

```
app="paloalto-GlobalProtect"
```

https://en.fofa.info/result?qbase64=YXBwPSJwYWxvYWx0by1HbG9iYWxQcm90ZWN0Ig%3D%3D

## Zoomeye

```
app:"Palo Alto Networks firewall httpd"
```

https://www.zoomeye.hk/searchResult?q=app%3A%22Palo%20Alto%20Networks%20firewall%20httpd%22&from=5o6o54m5MjQwNDE0MDE=

## Hunter.how

```
product.name="GlobalProtect Portal"
```

https://hunter.how/list?searchValue=product.name%3D%22GlobalProtect%20Portal%22

## Shodan

```
http.favicon.hash:-631559155
```

# How-To-Use

scan `urls.txt`๏ผš

```powershell
python CVE-2024-3400-RCE-CHECK.py -f urls.txt -p http://127.0.0.1:8083 -t 100
```

![](https://cdn.jsdelivr.net/gh/W01fh4cker/blog_image@main/image-20240422164802977.png)

# Reference

https://github.com/h4x0r-dz/CVE-2024-3400  

https://attackerkb.com/topics/SSTk336Tmf/cve-2024-3400/rapid7-analysis  

https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/