Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-13379 PoC — Fortinet FortiOS 路径遍历漏洞

Source
Associated Vulnerability
Title:Fortinet FortiOS 路径遍历漏洞 (CVE-2018-13379)
Description:An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
Description
CVE-2018-13379 - Fortinet SSL VPN Vulnerability
Readme
# 🛡️ CVE-2018-13379 - Fortinet SSL VPN Vulnerability

---

## 🔍 Overview

CVE-2018-13379 is a **critical path traversal** vulnerability in Fortinet FortiOS SSL VPN.  
It allows attackers to **download VPN web session files** and extract sensitive information.

- **Impact:** Information disclosure (usernames, session tokens)  
- **CVSSv3:** 8.6 (High)  
- **Exploitation:** Remote, unauthenticated  

---

## 💻 Vulnerable Versions

- FortiOS **5.4.6 – 5.4.12**  
- FortiOS **5.6.3 – 5.6.7**  
- FortiOS **6.0.0 – 6.0.4**  
- FortiProxy ≤ 1.2.8 / 2.0.0  

---

## 🛠️ Features of This Script

- Detects vulnerable FortiOS SSL VPN instances  
- Downloads `sslvpn_websession` file  
- Extracts **usernames** & **password**  
- Multi-threaded scanning  

---

## 🛡️ Mitigation / Protection

- **Patch FortiOS**: Upgrade to **6.0.5+** or latest available  
- **Enable 2FA** for VPN users  
- **Restrict VPN access** to trusted IPs only  

---

## ⚡ Usage

Scan a single IP:

```bash
python CVE-2018-13379.py -i 192.168.1.1:10443
```

Scan multiple IPs from a file:

```bash
python3 CVE-2018-13379.py -f targets.txt -n 20
```
---

**⚠️ Disclaimer:** Only use this for **authorized testing and research**. Unauthorized access is illegal.  

## Refrence
* [orange](https://blog.orange.tw/posts/2019-08-attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn/)
File Snapshot

[4.0K] /data/pocs/79d394b9f08fc5e8da249f57735cb0e66d0b1d1b ├── [3.6K] CVE-2018-13379.py ├── [6.9K] LICENSE └── [1.4K] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →