Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-13379 PoC — Fortinet FortiOS 路径遍历漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 路径遍历漏洞 (CVE-2018-13379)
Description:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS 5.6.3版本至5.6.7版本和6.0.0版本至6.0.4版本中的SSL VPN Web门户存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。
Description
CVE-2018-13379 - Fortinet SSL VPN Vulnerability
Readme
# 🛡️ CVE-2018-13379 - Fortinet SSL VPN Vulnerability

---

## 🔍 Overview

CVE-2018-13379 is a **critical path traversal** vulnerability in Fortinet FortiOS SSL VPN.  
It allows attackers to **download VPN web session files** and extract sensitive information.

- **Impact:** Information disclosure (usernames, session tokens)  
- **CVSSv3:** 8.6 (High)  
- **Exploitation:** Remote, unauthenticated  

---

## 💻 Vulnerable Versions

- FortiOS **5.4.6 – 5.4.12**  
- FortiOS **5.6.3 – 5.6.7**  
- FortiOS **6.0.0 – 6.0.4**  
- FortiProxy ≤ 1.2.8 / 2.0.0  

---

## 🛠️ Features of This Script

- Detects vulnerable FortiOS SSL VPN instances  
- Downloads `sslvpn_websession` file  
- Extracts **usernames** & **password**  
- Multi-threaded scanning  

---

## 🛡️ Mitigation / Protection

- **Patch FortiOS**: Upgrade to **6.0.5+** or latest available  
- **Enable 2FA** for VPN users  
- **Restrict VPN access** to trusted IPs only  

---

## ⚡ Usage

Scan a single IP:

```bash
python CVE-2018-13379.py -i 192.168.1.1:10443
```

Scan multiple IPs from a file:

```bash
python3 CVE-2018-13379.py -f targets.txt -n 20
```
---

**⚠️ Disclaimer:** Only use this for **authorized testing and research**. Unauthorized access is illegal.  

## Refrence
* [orange](https://blog.orange.tw/posts/2019-08-attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn/)
File Snapshot

[4.0K] /data/pocs/79d394b9f08fc5e8da249f57735cb0e66d0b1d1b ├── [3.6K] CVE-2018-13379.py ├── [6.9K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.