module

Fortinet FortiOS, FortiProxy, and FortiSwitchManager authentication bypass.

Disclosed
2022-10-10
Created
2022-10-19

Description

This module exploits an authentication bypass vulnerability
in the Fortinet FortiOS, FortiProxy, and FortiSwitchManager API
to gain access to a chosen account. And then add a SSH key to the
authorized_keys file of the chosen account, allowing
to login to the system with the chosen account.

Successful exploitation results in remote code execution.

Authors

Heyder Andrade @HeyderAndrade
Zach Hanley @hacks_zach

Platform

Linux,Unix

Architectures

cmd

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/linux/http/fortinet_authentication_bypass_cve_2022_40684
msf exploit(fortinet_authentication_bypass_cve_2022_40684) > show targets
...targets...
msf exploit(fortinet_authentication_bypass_cve_2022_40684) > set TARGET < target-id >
msf exploit(fortinet_authentication_bypass_cve_2022_40684) > show options
...show and set options...
msf exploit(fortinet_authentication_bypass_cve_2022_40684) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.