An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.
CVSS
No CVSS.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/PAN-SA-2025-0001 |
Configurations
No configuration.
History
15 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
Summary | (en) An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software. |
11 Jan 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-11 03:15
Updated : 2025-01-15 23:15
NVD link : CVE-2025-0107
Mitre link : CVE-2025-0107
CVE.ORG link : CVE-2025-0107
JSON object : View
Products Affected
No product.
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')