Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-6693 PoC — Fortinet FortiOS 信任管理问题漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 信任管理问题漏洞 (CVE-2019-6693)
Description:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS 5.6.10及之前版本、6.0.6及之前版本和6.2.0版本中存在安全漏洞,该漏洞源于程序使用硬编码加密密钥来加密配置备份文件中的敏感信息。攻击者可利用该漏洞访问备份文件,解密敏感数据。
Readme
# CVE-2019-6693

Have you changed your default FortiGate encryption keys? Run this script and find out! You can provide the entire configuration file dump or individual encrypted values. If the decrypted values aren't complete nonsense or produce a word, then it is likely the encryption is left as default.

## Installation

```bash
git clone https://github.com/Real4XoR/cve-2019-6693.git
cd cve-2019-6693
pip3 install -r requirements.txt
```

## Usage

Provide the entire `.conf` configuration file:

```bash
python3 cve-2019-6693.py --config <File>.conf
```

You can also provide just the encrypted string:

```bash
python3 cve-2019-6693.py --string <ENC String>
```
## Kudos

Rework of the below script to make it do a few more things.

https://github.com/saladandonionrings/cve-2019-6693
File Snapshot

[4.0K] /data/pocs/bbf9221c17c7fff42d8ea1197e043a0c2aa486c5 ├── [3.3K] cve-2019-6693.py ├── [ 793] README.md └── [ 20] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.