.. / CVE-2022-40684

Exploit for Fortinet - Authentication Bypass (CVE-2022-40684)

Description:

Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.

Nuclei Template

View the template here CVE-2022-40684.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-40684.yaml
Copy

References:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40684
https://securityonline.info/researchers-have-developed-cve-2022-40684-poc-exploit-code/
https://nvd.nist.gov/vuln/detail/CVE-2022-40684
https://socradar.io/what-do-you-need-to-know-about-fortinet-critical-authentication-bypass-vulnerability-cve-2022-40684/
https://github.com/horizon3ai/CVE-2022-40684/blob/master/CVE-2022-40684.py