TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Palo Alto – Putting the Protecc in GlobalProtect (CVE-2024-3400)

44 点作者 notmine1337大约 1 年前

9 条评论

K0HAX大约 1 年前
You know, when Linux admins say &quot;don&#x27;t run as root!&quot; we don&#x27;t only mean that users should not run as root. Nothing that doesn&#x27;t absolutely have to should run as root.<p>And before someone says &quot;but only root can read those files!&quot;, please take this opportunity to learn about filesystem ACLs. <a href="https:&#x2F;&#x2F;linux.die.net&#x2F;man&#x2F;1&#x2F;setfacl" rel="nofollow">https:&#x2F;&#x2F;linux.die.net&#x2F;man&#x2F;1&#x2F;setfacl</a><p>edit: Also, yes, this would not have fully solved the problem, but it is very likely that the amount of potential harm that could have been caused would have been significantly reduced.
评论 #40055421 未加载
kstrauser大约 1 年前
I just wrote this up elsewhere, but wow, is that Python code awful. It uses string interpolation to build a curl command line. Then it passes that string to a subprocess.Popen(cmd,shell=True). For those who don’t speak Python, that’s saying “run the string passed in here as a shell command exactly as if someone typed it into a bash prompt”. The right thing to to there would have been to create a list of arguments and pass that list in instead of a string, and set shell=False so that the list gets sent straight to the underlying syscall without being parsed and interpreted as a command line, with all the edge cases that brings.<p>As worryingly, the free, open source Bandit Python static analyzer immediately flagged this code when I tested it locally. If Palo Alto had any kind of static analysis in their build pipeline, this would have failed. If they’re not doing that, what else are they not doing?
评论 #40058936 未加载
评论 #40056336 未加载
hangonhn大约 1 年前
The combination of multiple bad behavior strung together is really interesting. I imagined the author of each bad behavior was unaware of the other bad behaviors and was basically like &quot;what&#x27;s the worst they can do?&quot;<p>I feel a lot of good exploits work this way where each small bad behavior can be leverages to magnify another.
评论 #40056346 未加载
paulproteus大约 1 年前
People are worried about `curl|bash` but not worried enough about C++ programs calling Python to call bash to call curl.
fullspectrumdev大约 1 年前
The arb file write with uncontrolled (empty) content being turned into exec due to another process is certainly an interesting find.<p>Usually arb file create bugs with no control of content are at best a DoS unless there’s another issue at play :)
评论 #40054622 未加载
评论 #40056755 未加载
mmsc大约 1 年前
Since Palo Alto are receiving all of this telemetry with GCP, couldn’t someone just send them terabytes of data to effectively DoS their bank account?
Wheaties466大约 1 年前
like most products connected to the internet, VPNs and firewalls can have vulnerabilities too. As long as its not super low hanging fruit that should have been caught or is a bad default configuration, its the response that matters the most to me.
评论 #40056722 未加载
评论 #40056711 未加载
评论 #40055911 未加载
neilv大约 1 年前
A few days ago, a colleague saw a port&#x2F;service scan:<p>&gt; <i>User-Agent: Expanse, a Palo Alto Networks company, searches across the global IPv4 space multiple times per day to identify customers&#x27; presences on the Internet. If you would like to be excluded from our scans, please send IP addresses&#x2F;domains to: scaninfo@paloaltonetworks.com</i><p>I could maybe see that for license enforcement, or for aggressively alerting users to the vulnerability even in absence of active service contracts.<p>Could also be someone <i>other than</i> PAN, looking for vulnerable PAN boxes.
评论 #40057231 未加载
dang大约 1 年前
Recent and related:<p><i>Palo Alto Networks PAN-OS Zero-Day Exploitation</i> - <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40016985">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=40016985</a> - April 2024 (59 comments)