支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:752

75.2%

POC详情: 3cb3bd34eeaf7f9671758e7feb30e892a48128f7

来源
关联漏洞
标题:Fortinet FortiWeb 安全漏洞 (CVE-2025-64446)
描述:Fortinet FortiWeb是美国飞塔(Fortinet)公司的一款Web应用层防火墙,它能够阻断如跨站点脚本、SQL注入、Cookie中毒、schema中毒等攻击的威胁,保证Web应用程序的安全性并保护敏感的数据库内容。 Fortinet FortiWeb 8.0.0版本至8.0.1版本、7.6.0版本至7.6.4版本、7.4.0版本至7.4.9版本、7.2.0版本至7.2.11版本和7.0.0版本至7.0.11版本存在安全漏洞,该漏洞源于相对路径遍历,可能导致执行管理命令。
介绍
# CVE-2025-64446 Exploit Tool

Exploit tool for CVE-2025-64446 vulnerability verification and exploitation in FortiWeb devices.

## Description

This tool tests for and exploits a path traversal vulnerability (CVE-2025-64446) in FortiWeb web application firewalls. It can be used to verify vulnerability status or exploit the CGI endpoint to create/modify user accounts.

## Installation

```bash
pip install -r requirements.txt
```

## Usage

### Vulnerability Verification (Read-only)

```bash
python3 exploit.py -t <target_ip> --check
```

### Execute Exploit

```bash
python3 exploit.py -t <target_ip> --exploit
```

### Custom Parameters

```bash
python3 exploit.py -t <target_ip> --exploit --username sxy --password sxyrxyadmin1!
```

### Multiple Targets from File

```bash
python3 exploit.py -l targets.txt --check
```

Create a `targets.txt` file with one IP address per line:
```
192.168.1.100
192.168.1.101
192.168.1.102
```

## Options

- `-t, --target` - Target IP address (required if `--targets-file` not used)
- `-l, --targets-file` - File containing target IP addresses (one per line, required if `--target` not used)
- `-p, --port` - Target port (default: 443)
- `--http` - Use HTTP instead of HTTPS
- `--check` - Vulnerability verification only (read-only)
- `--exploit` - Execute CGI endpoint exploit
- `--username` - Username for exploit (default: sxy)
- `--password` - Password to set (default: sxyrxyadmin1!)
- `--profname` - Profile name (default: prof_admin)
- `--vdom` - VDOM name (default: root)
- `--loginname` - Login name (default: admin)
- `--testpoint-name` - Testpoint/user name to create (default: Testpoint)

## Disclaimer

This tool is for authorized security research and educational purposes only. Only use on systems you own or have explicit permission to test.

文件快照

[4.0K] /data/pocs/3cb3bd34eeaf7f9671758e7feb30e892a48128f7 ├── [ 16K] exploit.py ├── [1.8K] README.md └── [ 33] requirements.txt 1 directory, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。