关联漏洞
标题:
Fortinet FortiOS 信任管理问题漏洞
(CVE-2019-6693)
描述:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS 5.6.10及之前版本、6.0.6及之前版本和6.2.0版本中存在安全漏洞,该漏洞源于程序使用硬编码加密密钥来加密配置备份文件中的敏感信息。攻击者可利用该漏洞访问备份文件,解密敏感数据。
描述
An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files and all non-administator passwords, private keys and High Availability passwords.
介绍
# FortiGate Password Decrypt Script - CVE-2019-6693

---
🔐 An authorized remote user with access or knowledge of the standard encryption key could gain access and decrypt the FortiOS backup files and all non-administrator passwords, private keys, and High Availability (HA) passwords.
---
## Overview
This Python script is designed to recover passwords encrypted using FortiGate's encryption method. It can be used to decrypt both user passwords and High Availability (HA) configuration passwords stored in FortiOS configuration files.
## Usage
### Prerequisites
- Python 3.x
```bash
git clone https://github.com/saladandonionrings/cve-2019-6693.git
cd cve-2019-6693
pip3 install pycryptodome
```
### Decrypting Users Passwords
1. Have "admin read access" at least to Fortigate.
2. Go to "CLI Console" > `show user local` and download
3. Place the FortiOS user data in a text file named `data.txt`. Ensure that the data file contains user information in the FortiOS format.
### Decrypting HA Configuration Passwords
1. Go to "CLI Console" > `show system ha`and download
2. Place the FortiOS user data in a text file named `ha_config.txt`. Ensure that the data file contains HA information in the FortiOS format.
3. Run the script using the following command:
```bash
python3 fortigate-decrypt.py
```
# Disclaimer
⚠️ This script is provided for educational and awareness purposes only. Use this script responsibly and in compliance with all applicable laws and regulations. The authors are not responsible for any misuse or unauthorized access.
文件快照
[4.0K] /data/pocs/cd8a878698ba62c887773679d905effccf1eb27b
├── [3.0K] fortigate-decrypt.py
└── [1.6K] README.md
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。