Share
## https://sploitus.com/exploit?id=A5863896-9B12-56E7-9B1C-B7A998AB17C8
# Cyberspace Mapping Dork
## Fofa
```
app="paloalto-GlobalProtect"
```
https://en.fofa.info/result?qbase64=YXBwPSJwYWxvYWx0by1HbG9iYWxQcm90ZWN0Ig%3D%3D
## Zoomeye
```
app:"Palo Alto Networks firewall httpd"
```
https://www.zoomeye.hk/searchResult?q=app%3A%22Palo%20Alto%20Networks%20firewall%20httpd%22&from=5o6o54m5MjQwNDE0MDE=
## Hunter.how
```
product.name="GlobalProtect Portal"
```
https://hunter.how/list?searchValue=product.name%3D%22GlobalProtect%20Portal%22
## Shodan
```
http.favicon.hash:-631559155
```
# How-To-Use
scan `urls.txt`๏ผ
```powershell
python CVE-2024-3400-RCE-CHECK.py -f urls.txt -p http://127.0.0.1:8083 -t 100
```
![](https://cdn.jsdelivr.net/gh/W01fh4cker/blog_image@main/image-20240422164802977.png)
# Reference
https://github.com/h4x0r-dz/CVE-2024-3400
https://attackerkb.com/topics/SSTk336Tmf/cve-2024-3400/rapid7-analysis
https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/