The watchTowr folks published an in-depth article today covering the Palo Alto Networks unauthenticated RCE at: https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/

Even more impressive is they also disclosed a zero-day directory traversal vulnerability in the #golang gorilla/sessions package (used far and wide). The gorilla vulnerability only applies to code using the FilesystemStore, but it is still likely to impact a huge range of products and services. A pull request to fix this is open at https://github.com/gorilla/sessions/pull/274

Huge thanks to @alizthehax0r and the watchTowr team as well as @moloch of Bishop Fox for co-discovery (and providing a fix for) of the gorilla/sessions bug.

Palo Alto - Putting The Protecc In GlobalProtect (CVE-2024-3400)

Welcome to April 2024, again. We’re back, again. Over the weekend, we were all greeted by now-familiar news—a nation-state was exploiting a “sophisticated” vulnerability for full compromise in yet another enterprise-grade SSLVPN device. We’ve seen all the commentary around the certification process of these devices for certain

watchTowr Labs - Blog

@hdm @alizthehax0r @moloch Thank you for tracing this to the open source project and filing the vulndb entry.

Could you share the vulnerable binary, or run “go version -m” on it? I want to confirm govulncheck would have flagged it if the CVE was already known.

@filippo @alizthehax0r @moloch there was no CVE for the gorilla/sessions bug, only the PAN RCE (which is mostly-tied to their telemetry log parse)
@hdm @alizthehax0r @moloch yep, just wanted to make sure that had one been around / after we merge one, the detection works!
@filippo @hdm @moloch thanks for filing issues and chasing people / things! I'm a bit lost once I get outside my niche of RE, the golang ecosystem is alien to me.
@alizthehax0r thanks for doing the hard part!