CVE-2018-13379 - Fortinet SSL VPN Vulnerability# 🛡️ CVE-2018-13379 - Fortinet SSL VPN Vulnerability
---
## 🔍 Overview
CVE-2018-13379 is a **critical path traversal** vulnerability in Fortinet FortiOS SSL VPN.
It allows attackers to **download VPN web session files** and extract sensitive information.
- **Impact:** Information disclosure (usernames, session tokens)
- **CVSSv3:** 8.6 (High)
- **Exploitation:** Remote, unauthenticated
---
## 💻 Vulnerable Versions
- FortiOS **5.4.6 – 5.4.12**
- FortiOS **5.6.3 – 5.6.7**
- FortiOS **6.0.0 – 6.0.4**
- FortiProxy ≤ 1.2.8 / 2.0.0
---
## 🛠️ Features of This Script
- Detects vulnerable FortiOS SSL VPN instances
- Downloads `sslvpn_websession` file
- Extracts **usernames** & **password**
- Multi-threaded scanning
---
## 🛡️ Mitigation / Protection
- **Patch FortiOS**: Upgrade to **6.0.5+** or latest available
- **Enable 2FA** for VPN users
- **Restrict VPN access** to trusted IPs only
---
## ⚡ Usage
Scan a single IP:
```bash
python CVE-2018-13379.py -i 192.168.1.1:10443
```
Scan multiple IPs from a file:
```bash
python3 CVE-2018-13379.py -f targets.txt -n 20
```
---
**⚠️ Disclaimer:** Only use this for **authorized testing and research**. Unauthorized access is illegal.
## Refrence
* [orange](https://blog.orange.tw/posts/2019-08-attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn/)
[4.0K] /data/pocs/79d394b9f08fc5e8da249f57735cb0e66d0b1d1b
├── [3.6K] CVE-2018-13379.py
├── [6.9K] LICENSE
└── [1.4K] README.md
0 directories, 3 files