Skip to content

Latest commit

 

History

History
43 lines (28 loc) · 1.87 KB

README.md

File metadata and controls

43 lines (28 loc) · 1.87 KB

CVE-2024-47575: FortiManager Missing Authentication

Overview

CVE-2024-47575 A missing authentication for critical function in FortiManager allows attacker to execute arbitrary code or commands via specially crafted requests.

Exploit:

Details

  • CVE ID: CVE-2024-47575
  • Published: 2024-10-23
  • Impact: Confidentiality
  • Exploit Availability: Not public, only private.
  • CVSS: 9.8

Vulnerability Description

CVE-2024-47575 is a critical vulnerability in the FortiManager platform, specifically affecting its fgfmsd daemon. Classified under CWE-306, it stems from insufficient authentication for management functions in the fgfmsd service, which handles communication between FortiManager and FortiGate devices.

This flaw allows a remote attacker to send crafted requests, bypass access controls, and execute arbitrary commands on the FortiManager system, potentially compromising the network.

Affected Versions

FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7

Running

To run exploit you need Python 3.9. Execute:

python exploit.py -h 10.10.10.10 -c 'uname -a'

Exploit:

image image image