跳转到帖子

Fortinet FortiNAC keyUpload.jsp arbitrary file write

recommended_posts

发布于
  • Members

Fortinet FortiNAC keyUpload.jsp arbitrary file write

Disclosed
02/16/2023
Created
03/14/2023

Description

This module uploads a payload to the /tmp directory in addition to a cron job to /etc/cron.d which executes the payload in the context of the root user. The core vulnerability is an arbitrary file write issue in /configWizard/keyUpload.jsp which is accessible remotely and without authentication. When you send the vulnerable endpoint a ZIP file, it will extract an attacker controlled file to a directory of the attackers choice on the target system. This issue is exploitable on the following versions of FortiNAC: FortiNAC version 9.4 prior to 9.4.1 FortiNAC version 9.2 prior to 9.2.6 FortiNAC version 9.1 prior to 9.1.8 FortiNAC 8.8 all versions FortiNAC 8.7 all versions FortiNAC 8.6 all versions FortiNAC 8.5 all versions FortiNAC 8.3 all versions

Author(s)

  • Gwendal Guégniaud
  • Zach Hanley
  • jheysel-r7

Platform

Linux,Unix

Architectures

cmd, x64, x86

Development

  • Source Code
  • History
  • 查看数 696
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…