Exploit for Authentication Bypass Using an Alternate Path or Channel in Fortinet Fortiproxy
Discription

image
<<<<<<< HEAD CVE-2024-55591-POC ======= CVE-2024-55591 – FortiOS WebSocket CLI Auth Bypass (PoC) This is a Proof-of-Concept (PoC) tool for exploiting CVE-2024-55591, a vulnerability in FortiOS that allows unauthenticated access to the CLI over WebSocket. Features Automatic detection of FortiOS GUI and vulnerability status Execute arbitrary CLI commands via WebSocket Interactive shell interface Admin password reset functionality (–reset-user) SSL support Usage Basic interactive mode: bash python3 poc.py –host <target_ip> –port 443 –ssl Then use the prompt: FortiOS# get system status FortiOS# exit Reset admin password: bash python3 poc.py –host <target_ip> –port 443 –ssl –reset-user Admin2 –new-pass Forti2024! Developer Telegram: @cherny_zhizn Disclaimer: This tool is provided for educational and authorized testing purposes only. 4fe5de8 (Add full PoC and README for CVE-2024-55591 by…Read More

Back to Main

Subscribe for the latest news: