Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-34992 PoC — Fortinet FortiSIEM 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Fortinet FortiSIEM 操作系统命令注入漏洞 (CVE-2023-34992)
Description:Fortinet FortiSIEM是美国飞塔(Fortinet)公司的一套安全信息和事件管理系统。该系统包括资产发现、工作流程自动化和统一管理等功能。 Fortinet FortiSIEM 存在安全漏洞,该漏洞源于存在操作系统命令注入漏洞。允许攻击者通过精心设计的 API 请求执行未经授权的代码或命令。
Description
CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit
Readme
# CVE-2023-34992: Fortinet FortiSIEM Unauthenticated Command Injection
Proof of concept exploit to blindly execute commands as root on vulnerable FortiSIEM appliances

## Blog Post
Root cause and indicators of compromise here:
[https://www.horizon3.ai/attack-research/disclosures/cve-2023-34992-fortinet-fortisiem-command-injection-deep-dive](https://www.horizon3.ai/attack-research/disclosures/cve-2023-34992-fortinet-fortisiem-command-injection-deep-dive/)

## Usage
```
% python3 CVE-2023-34992.py -h
usage: CVE-2023-34992.py [-h] -t TARGET [-p PORT] -c COMMAND

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        The IP address of the target
  -p PORT, --port PORT  The port of the Phoenix Monitor service
  -c COMMAND, --command COMMAND
                        The command to blindly execute 
```

## Follow the Horizon3.ai Attack Team on Twitter for the latest security research:
*  [Horizon3 Attack Team](https://twitter.com/Horizon3Attack)
*  [James Horseman](https://twitter.com/JamesHorseman2)
*  [Zach Hanley](https://twitter.com/hacks_zach)

## Disclaimer
This software has been created purely for the purposes of academic research and for the development of effective defensive techniques, and is not intended to be used to attack systems except where explicitly authorized. Project maintainers are not responsible or liable for misuse of the software. Use responsibly.
File Snapshot

[4.0K] /data/pocs/6bde07614e36d622d0b7b34b15add22ecb3702cb ├── [1.5K] CVE-2023-34992.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.