Exploit details
The watchTowr writeup at https://labs.watchtowr.com/pots-and-pans-aka-an-sslvpn-palo-alto-pan-os-cve-2024-0012-and-cve-2024-9474/ has the exploit details.
1. Set an HTTP header of "X-Pan-Authcheck: off" which basically turns off authentication (!!)
2. Specify user=`$myEvilCommand` (yes, backticks...) which gets expanded via a PHP call that passes $user straight through to a shell (!!!!)
Words fail me.