Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6693 PoC — Fortinet FortiOS 信任管理问题漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 信任管理问题漏洞 (CVE-2019-6693)
Description:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS 5.6.10及之前版本、6.0.6及之前版本和6.2.0版本中存在安全漏洞,该漏洞源于程序使用硬编码加密密钥来加密配置备份文件中的敏感信息。攻击者可利用该漏洞访问备份文件,解密敏感数据。
Description
Decrypt reversible secrets encrypted using the default hardcoded key related to CVE-2020-9289 on FortiAnalyzer/FortiManager (the only difference with CVE-2019-6693 is the encryption routine).
Readme
# Decrypt FortiManager configuration secrets (CVE-2020-9289)

CVE-2020-9289 and CVE-2019-6693 are related to the same default and hardcoded key.

The only differences on the decryption routine implemented in FortiManager/FortiAnalyzer are:

- The IV handling (all the 16 bytes are provided before the encrypted data from digits).
- The last encrypted block is stripped from the output so it needs junk to be appended then removed from the cleartext.

See https://www.fortiguard.com/psirt/FG-IR-19-007 for more details.

File Snapshot

[4.0K] /data/pocs/7d3b76344a33d458106f92373bcb661afb93fd44 ├── [1.2K] cve-2020-9289.py ├── [ 520] README.md └── [ 22] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.