Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-40684 PoC — Fortinet FortiOS 授权问题漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 授权问题漏洞 (CVE-2022-40684)
Description:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS存在授权问题漏洞。目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Readme
# Fortigate-Belsen-Leak-Dump-CVE-2022-40684


How This Script Works
Folder Traversal:

The script goes through all subfolders under root_folder and looks for vpn-passwords.txt.
Line Processing:

Skips any lines with the banner -=-= Belsen Group -=-=.
For lines with the username:password format:
Splits the line at the colon : using line.split(":", 1).
Extracts the part after the colon (password) and writes it to the output file.
Output:

Passwords are saved in the extracted_passwords.txt file, one password per line.
File Snapshot

[4.0K] /data/pocs/a43785101dcd0164ad757479b1be38f8e8157418 ├── [1.0K] extract passwords only ├── [ 937] python file to extract all credentials (username:password) └── [ 521] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.