支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 6f3664da877167d020968d76de1c0657f97eb249

来源
关联漏洞
标题:Fortinet FortiOS和Fortinet FortiProxy 安全特征问题漏洞 (CVE-2025-25255)
Description:Fortinet FortiOS和Fortinet FortiProxy都是美国飞塔(Fortinet)公司的产品。Fortinet FortiOS是一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。Fortinet FortiProxy是一种安全的网络代理,通过结合多种检测技术,如Web过滤、DNS过滤、DLP、反病毒、入侵防御和高级威胁保护,可以保护员工免受网络攻击。FortiProxy有助于减
Description
CVE-2025-25255
介绍
# watchTowr-vs-Fortiweb-AuthBypass

Detection Artifact Generator for FortiWeb Authentication Bypass


See our [blog post](https://labs.watchtowr.com/) for technical details


# Detection in Action

```
python watchTowr-vs-Fortiweb-AuthBypass.py 192.168.1.99
                         __         ___  ___________
         __  _  ______ _/  |__ ____ |  |_\__    ____\____  _  ________
         \ \/ \/ \__  \    ___/ ___\|  |  \|    | /  _ \ \/ \/ \_  __ \
          \     / / __ \|  | \  \___|   Y  |    |(  <_> \     / |  | \/
           \/\_/ (____  |__|  \___  |___|__|__  | \__  / \/\_/  |__|
                                  \/          \/     \/

        watchTowr-vs-Fortiweb-AuthBypass.py

        (*) FortiWeb Authentication Bypass Artifact Generator

          - Sina Kheirkhah (@SinSinology) and Jake Knott (@inkmoro) of watchTowr (@watchTowrcyber)

        CVEs: [CVE-2025-xxxxx]

[+] Exploit sent successfully.
[*] Check for the new user [ 35f36895 ] with password [ 35f36895 ]


```

# Description

This script attempts to detect if FortiWeb is vulnerable to Authentication Bypass

# Affected Versions

FortiWeb Versions Below 8.0.2 are affected, for more specific versions please contact [FortiGuard Labs PSIRT](https://fortiguard.fortinet.com/)


# Follow [watchTowr](https://watchTowr.com) Labs

For the latest security research follow the [watchTowr](https://watchTowr.com) Labs Team 

- https://labs.watchtowr.com/
- https://x.com/watchtowrcyber
文件快照

[4.0K] /data/pocs/6f3664da877167d020968d76de1c0657f97eb249 ├── [1.4K] README.md └── [2.9K] watchTowr-vs-Fortiweb-AuthBypass.py 1 directory, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。