{"uuid": "6c717d0b-15a5-4f4e-b443-116bc1929979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2034", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1746", "content": "CVE-2020-2034:\nAn OS Command Injection vulnerability in the PAN-OS (&lt;9.1.3, &lt;9.0.9, &lt;8.1.15, 8.0, 7.1) GlobalProtect portal allows an unauthenticated network-based attacker to execute arbitrary OS commands with root privileges\nhttps://security.paloaltonetworks.com/CVE-2020-2034\nPoC\nto determine the version used by the Palo Alto Network Firewall, by examining the etag from a curl scan on their favicon, and login.esp:\nhttps://github.com/blackhatethicalhacking/CVE-2020-2034-POC", "creation_timestamp": "2020-09-14T11:10:04.000000Z"}