Skip to content

Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]

Notifications You must be signed in to change notification settings

dkstar11q/CVE-2022-40684-2

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2022-40684 (CVSS score: 9.6)

POC for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager appliances.

Vulnerable Products

  • FortiOS versions between 7.0.0 – 7.0.6 and 7.2.0 – 7.2.1
  • FortiProxy versions between 7.0.0 – 7.0.6 and version 7.2.0
  • FortiSwitchManager versions 7.0.0 and 7.2.0

Resource

https://socradar.io/what-do-you-need-to-know-about-fortinet-critical-authentication-bypass-vulnerability-cve-2022-40684/

Summary

This POC abuses the authentication bypass vulnerability to set an SSH key for the specified user.

Usage

root@kali:~# python exploit.py -h
 
     ______           __  _            __     ____  ____________
    / ____/___  _____/ /_(_)___  ___  / /_   / __ \/ ____/ ____/
   / /_  / __ \/ ___/ __/ / __ \/ _ \/ __/  / /_/ / /   / __/   
  / __/ / /_/ / /  / /_/ / / / /  __/ /_   / _, _/ /___/ /___   
 /_/    \____/_/   \__/_/_/ /_/\___/\__/  /_/ |_|\____/_____/ 


    CVE-2022-40684 Exploit By Valentin Lobstein (Chocapikk)


usage: exploit.py [-h] [-k KEY] [-u URL] [-l LIST] [-U USERNAME] [-t THREADS] [-o OUTPUT]

options:
  -h, --help            show this help message and exit
  -k KEY, --key KEY     Your SSH pubKey id_rsa.pub
  -u URL, --url URL     Base target uri (ex. http://target-uri/)
  -l LIST, --list LIST  List of targets (list.txt)
  -U USERNAME, --username USERNAME
                        Username
  -t THREADS, --threads THREADS
                        Threads
  -o OUTPUT, --output OUTPUT
                        Output file

Zoomeye Dork


title:"FortiGate"

Mitigations

Update to the latest version or mitigate by following the instructions within the Fortinet PSIRT

Disclaimer

This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.

About

Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 64.4%
  • Lua 35.6%