TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Palo Alto – Putting the Protecc in GlobalProtect (CVE-2024-3400)

44 pointsby notmine1337about 1 year ago

9 comments

K0HAXabout 1 year ago
You know, when Linux admins say &quot;don&#x27;t run as root!&quot; we don&#x27;t only mean that users should not run as root. Nothing that doesn&#x27;t absolutely have to should run as root.<p>And before someone says &quot;but only root can read those files!&quot;, please take this opportunity to learn about filesystem ACLs. <a href="https:&#x2F;&#x2F;linux.die.net&#x2F;man&#x2F;1&#x2F;setfacl" rel="nofollow">https:&#x2F;&#x2F;linux.die.net&#x2F;man&#x2F;1&#x2F;setfacl</a><p>edit: Also, yes, this would not have fully solved the problem, but it is very likely that the amount of potential harm that could have been caused would have been significantly reduced.
评论 #40055421 未加载
kstrauserabout 1 year ago
I just wrote this up elsewhere, but wow, is that Python code awful. It uses string interpolation to build a curl command line. Then it passes that string to a subprocess.Popen(cmd,shell=True). For those who don’t speak Python, that’s saying “run the string passed in here as a shell command exactly as if someone typed it into a bash prompt”. The right thing to to there would have been to create a list of arguments and pass that list in instead of a string, and set shell=False so that the list gets sent straight to the underlying syscall without being parsed and interpreted as a command line, with all the edge cases that brings.<p>As worryingly, the free, open source Bandit Python static analyzer immediately flagged this code when I tested it locally. If Palo Alto had any kind of static analysis in their build pipeline, this would have failed. If they’re not doing that, what else are they not doing?
评论 #40058936 未加载
评论 #40056336 未加载
hangonhnabout 1 year ago
The combination of multiple bad behavior strung together is really interesting. I imagined the author of each bad behavior was unaware of the other bad behaviors and was basically like &quot;what&#x27;s the worst they can do?&quot;<p>I feel a lot of good exploits work this way where each small bad behavior can be leverages to magnify another.
评论 #40056346 未加载
paulproteusabout 1 year ago
People are worried about `curl|bash` but not worried enough about C++ programs calling Python to call bash to call curl.
fullspectrumdevabout 1 year ago
The arb file write with uncontrolled (empty) content being turned into exec due to another process is certainly an interesting find.<p>Usually arb file create bugs with no control of content are at best a DoS unless there’s another issue at play :)
评论 #40054622 未加载
评论 #40056755 未加载
mmscabout 1 year ago
Since Palo Alto are receiving all of this telemetry with GCP, couldn’t someone just send them terabytes of data to effectively DoS their bank account?
Wheaties466about 1 year ago
like most products connected to the internet, VPNs and firewalls can have vulnerabilities too. As long as its not super low hanging fruit that should have been caught or is a bad default configuration, its the response that matters the most to me.
评论 #40056722 未加载
评论 #40056711 未加载
评论 #40055911 未加载
neilvabout 1 year ago
A few days ago, a colleague saw a port&#x2F;service scan:<p>&gt; <i>User-Agent: Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#x27; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses&#x2F;domains to: scaninfo@paloaltonetworks.com</i><p>I could maybe see that for license enforcement, or for aggressively alerting users to the vulnerability even in absence of active service contracts.<p>Could also be someone <i>other than</i> PAN, looking for vulnerable PAN boxes.
评论 #40057231 未加载
dangabout 1 year ago
Recent and related:<p><i>Palo Alto Networks PAN-OS Zero-Day Exploitation</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40016985">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40016985</a> - April 2024 (59 comments)