Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-17658 PoC — Fortinet FortiClient FortiTray 代码问题漏洞

Source
Associated Vulnerability
Title:Fortinet FortiClient FortiTray 代码问题漏洞 (CVE-2019-17658)
Description:Fortinet FortiClient是美国飞塔(Fortinet)公司的一套移动终端安全解决方案。该方案与FortiGate防火墙设备连接时可提供IPsec和SSL加密、广域网优化、终端合规和双因子认证等功能。 Fortinet FortiClient FortiTray(Windows)6.2.2及之前版本中存在代码问题漏洞。攻击者可通过使用FortiClientConsole可执行服务路径利用该漏洞提升权限。
Description
Unquoted Service Path exploit in FortiClient (CVE-2019-17658)
Readme
# Unquoted Service Path exploit in FortiClient (CVE-2019-17658)

FortiClient for Windows prior to 6.2.3 is vulnerable to an unquoted service path vulnerability. That may allow an attacker to gain elevated privileges via the FortiClientConsole executable service path.

Base Score: 9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

### Affected Component
FortiClient FortiTray

### Affected Products
FortiClient for Windows Versions 6.2.2 and below.

### Patched in Version
FortiClient for Windows version 6.2.3 or above.

### PoC

Private: The PoC is not published because it's obvious. 

### Links:
- https://nvd.nist.gov/vuln/detail/CVE-2019-17658
- https://fortiguard.com/psirt/FG-IR-19-281
File Snapshot

[4.0K] /data/pocs/c8e601c05821b55cb5b2664c79230b00de294f7f └── [ 703] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.