9.8
CVSSv3

CVE-2018-13379

Published: 04/06/2019 Updated: 03/06/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 516
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated malicious user to download system files via special crafted HTTP resource requests.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fortinet fortios

Exploits

# Exploit Title: FortiOS Leak file - Reading login/passwords in clear text # Google Dork: intext:"Please Login" inurl:"/remote/login" # Date: 17/08/2019 # Exploit Author: Carlos E Vieira # Vendor Homepage: wwwfortinetcom/ # Software Link: wwwfortinetcom/products/fortigate/fortioshtml # Version: This vulnerability affect ( For ...
# Exploit Title: FortiOS Leak file - Reading login/passwords in clear text # Google Dork: intext:"Please Login" inurl:"/remote/login" # Date: 17/08/2019 # Exploit Author: Carlos E Vieira # Vendor Homepage: wwwfortinetcom/ # Software Link: wwwfortinetcom/products/fortigate/fortioshtml # Version: This vulnerability affect ( For ...
FortiOS versions 563 through 567 and 600 through 604 suffer from a credential disclosure vulnerability ...
This Metasploit module exploits FortiOS versions 563 through 567 and 600 through 604 to leverage a credential disclosure vulnerability by reading the /dev/cmdb/sslvpn_websession file ...

Github Repositories

FG-IR-18-384 (CVE-2018-13379) Exploitation Tool Exploit allowing for the recovery of cleartext credentials This tool is provided for testing purposes only Only run it against infrastructure for which you have recieved permission to test Headnod to those who discovered the exploit, more information by the researcher can be found here: blogorangetw/2019/08/attacking-

CVE-2018-13379 Exploit

FortiOS-Credentials-Disclosure CVE-2018-13379 Exploit Usage : python CVE-2018-13379py listtxt

CVE-2018-13379 Script for Nmap NSE.

cve2018-13379-nmap-script CVE-2018-13379 Script for Nmap NSE An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 600 to 604, 563 to 567 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests

CVE-2018-13379 CVE-2018-13379 Module for Router Scan Project How To Use prepare pip3 install time,threading,ipcalc,requests usage python3 exppy -f [listtxt] Copyright some part of this repository that send tcp response is partly forked from milo2012/CVE-2018-13379 with some changes for APIs of Route

CVE-2018-13379

CVE-2018-13379 CVE-2018-13379 blogorangetw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpnhtml fortiguardcom/psirt/FG-IR-18-384 The below versions of FortiOS were vulnerable FortiOS 563 to 567 FortiOS 600 to 604 ONLY if the SSL VPN service (web-mode or tunnel-mode) is enabled

Cring-Ransomware RELATED IOCs, MITIGATION STEPS AND REFERENCE LINKS **Common Vulnerabilities and Exposures (CVE) ** (CVE-2018-13379 )Fortinet FortiOS, (CVE-2010-2861)-Adobe ColdFusion flaw IOCs(Indicators of compromise) SHA-256 f7d270ca0f2b4d21830787431f881cd004b2eb102cc3048c6b4d69cb775511c8 e687308cd4184e17c33fa9e44686e7d6a4d73adf65f7fb3cac9c4ad765b4ffdf 771a680f9a09a7a73ac267

A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.

Fortiscan (CVE-2018-13379) (FG-IR-18-384) Exploitation Tool, You can use this tool to check the vulnerability in your FortiGate SSL-VPN This vulnerability affects the following versions: • FortiOS 60 - 600 to 604 • FortiOS 56 - 563 to 567 • FortiOS 54 - 546 to 5412 wwwfortinetcom/blog/business-and-technology/fortios-ssl-vulnerability

CVE-2018-13379-FortinetVPN An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 600 to 604, 563 to 567 and 546 to 5412 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests

Legadro-Forti-Scanner It is updated Forti Vpn Scanner of (CVE-2018-13379) (FG-IR-18-384) for Windows Automatic scan for vuln of: /remote/fgt_lang?lang=//////////////dev/cmdb/sslvpn_websession Fixed bugs such as stuck on dead Forti IP and saving results in folder: output as a ip:porthtml How to use: legadro-forti-scannerexe ipstxt ipstxt must be in format like this:

Small Archive of leaked materials that i found interesting and that can be used for Research and analysis purposes (Malwares, Leaks & Links, More To add soon)

Vault6 Telegram channel : tme/Vault6 SunBurst : FireEye Tools Supernova_webshell_backdoor APT_Dropper SunBurst_FalsePositives Sunburst_APT_Backdoor APTs Android Malware Collection : Anubis Source Dendroid Source APT-C-23 FrozenCell (Egypt) 🇪🇬 APT33 | APT34 | APT 39 Shamoonn (Islamic Republic of Iran) 🇮🇷 Leaks : Readmetxt (Mega/Torrent Linksf

CVE-2018-13379-FortinetVPN An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 600 to 604, 563 to 567 and 546 to 5412 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests

FortiFuck-Checker Tool written in Bash script to check CVE-2018-13379 Usage: -h Get this help message -t Insert a valid IP Address to check IP:port -l Provide a path to a file containing a list of IPs, one per line IP:port -c Provide a country name if you're interested in a specific country's IPs -o Output filename

Fortinet FortiOS路径遍历漏洞 (CVE-2018-13379)批量检测脚本

使用方法&免责声明 该脚本为Fortinet FortiOS路径遍历漏洞 (CVE-2018-13379)批量检测脚本。 使用方法:Python CVE-2018-13379py urltxt 漏洞地址输出在vultxt中 影响版本: Fortinet FortiOS 563 - 567、600 - 604 版本中的SSL VPN 受此漏洞影响。 漏洞源于该系统未能正确地过滤资源或文件路径中的

REvil Ransomware Realated IOCs , Mitigation steps and References Common Vulnerabilities and Exposures: CVE-2018-13379, CVE-2019-2725, CVE-2019-11510, CVE-2021-30116 IOCs 18[]223[]199[]234 161[]35[]239[]148 193[]204[]114[]232 dsagovbd/documents/magazine-document_89046_2021-02-28pdf wwwtrendmicrocom/vinfo/us/security/news/ransomware-spotlight/ransomw

Dorks for Google, Shodan and BinaryEdge

Dorks are cool Dorks for Google, Shodan and BinaryEdge Only for use on bug bounty programs or in cordination with a legal security assesment I am in no way responsible for the usage of these search queries Be responsible thanks - wwwbugcrowdcom/resource/what-is-responsible-disclosure/ This repository is "under construction" feel free to make pull requests

Extract Useful info from SSL VPN Directory Traversal Vulnerability (FG-IR-18-384)

FG-IR-18-384 (CVE-2018-13379) Exploitation Tool Exploit allowing for the recovery of cleartext credentials This tool is provided for testing purposes only Only run it against infrastructure for which you have recieved permission to test Headnod to those who discovered the exploit, more information by the researcher can be found here: blogorangetw/2019/08/attacking-

Fortigate CVE-2018-13379 - Tool to search for vulnerable Fortigate hosts in Rapid7 Project Sonar data anonymously through The Tor network.

At Doom Fortigate ================= =============== =============== ======== ======== \\ \\ // \\ // \\ \\ \\// // || _____ || || _____ || || _____ || || \/ || || || || || || || || || || || || || || || || || || || || || || || ||

A curated list of my functional exploits...

Public-Exploits A curated list of my functional exploits About Public exploits (re)writed for learning purpose or pentesting / red teaming assessments Contents Centreon Centreon Web CVE-2015-1560, CVE-2015-1561 | Centreon Web Time-Based Blind SQLi to RCE Fortinet Fortigate CVE-2018-13379 | Fortigate SSL-VPN Credentials Stealer CVE-2018-13382 | Fortigate SSL-VPN

A curated list of my functional exploits...

Public-Exploits A curated list of my functional exploits About Public exploits (re)writed for learning purpose or pentesting / red teaming assessments Contents Centreon Centreon Web CVE-2015-1560, CVE-2015-1561 | Centreon Web Time-Based Blind SQLi to RCE Fortinet Fortigate CVE-2018-13379 | Fortigate SSL-VPN Credentials Stealer CVE-2018-13382 | Fortigate SSL-VPN

FortiVuln

CVE-2018-13379-Fortinet FortiVuln

Conti-Ransomware RELATED IOCs, MITIGATION STEPS AND REFERENCE LINKS Common Vulnerabilities and Exposures : Firewall Vulnerabilities CVE-2018-13379, CVE-2018-13374, gather foothold using Cobalt strike IOCs (Indicators of compromise) BazarLoader-- 642276992|443 1613515592|443 16135147110|443 642276560|443 Loader download-- millscruelgcom 459511133|80 Cobalt Strike

Recent Articles

Ransomware: How Attackers are Breaching Corporate Networks
Symantec Threat Intelligence Blog • Karthikeyan C Kasiviswanathan Vishal Kamble • 28 Apr 2024

Latest tools, tactics, and procedures being used by the Hive, Conti, and AvosLocker ransomware operations.

Posted: 28 Apr, 20228 Min ReadThreat Intelligence SubscribeFollowtwitterlinkedinRansomware: How Attackers are Breaching Corporate NetworksLatest tools, tactics, and procedures being used by the Hive, Conti, and AvosLocker ransomware operations.Targeted ransomware attacks continue to be one of the most critical cyber risks facing organizations of all sizes. The tactics used by ransomware attackers are continually evolving, but by identifying the most freq...

The Threat Landscape in 2021
Symantec Threat Intelligence Blog • Threat Hunter Team • 19 Jan 2024

Symantec takes a look at the cyber security trends that shaped the year

Posted: 19 Jan, 20226 Min ReadThreat Intelligence SubscribeFollowtwitterlinkedinThe Threat Landscape in 2021Symantec takes a look at the cyber security trends that shaped the yearFrom the evolving ransomware ecosystem to attacks against critical infrastructure, Symantec looks back over the cyber-security trends that shaped 2021. A new whitepaper from Symantec, a division of Broadcom Software, takes a look back at the some of the major thre...

Emails, chat logs, more leaked online from far-right militia linked to US Capitol riot
The Register • Iain Thomson in San Francisco • 28 Sep 2021

Get our weekly newsletter Plus: Other infosec news from this month

In brief Emails, chat logs, membership records, donor lists and other files siphoned from a far-right anti-government self-styled militia were leaked online on Monday, it appears. Some 5GB of data belonging to the Oath Keepers ‒ at least four of whom have been indicted for and admitted their role in the January 6 storming of the US capitol – was passed to the DDoSecrets Collective and shared online. The membership list contains accounts with 160 US government and military email addresses, th...

Patch now? Why enterprise exploits are still partying like it's 1999
The Register • Davey Winder • 08 Sep 2021

Get our weekly newsletter Am I only dreaming, or is this burning an Eternal Blue?

Some vulnerabilities remain unreported for the longest time. The 12-year-old Dell SupportAssist remote code execution (RCE) flaw – which was finally unearthed earlier this year – would be one example. Others, however, have not only been long since reported and had patches released, but continue to pose a threat to enterprises. A joint advisory from the National Cyber Security Centre (NCSC) and the US Cybersecurity and Infrastructure Security Agency (CISA), published in late July, listed the ...

'Anomalous surge in DNS queries' knocked Microsoft's cloud off the web last week
The Register • Iain Thomson in San Francisco • 06 Apr 2021

Plus: Top universities hit by data-stealing extortionists

in Brief It was a tsunami of DNS queries that ultimately took out a host of Microsoft services, from Xbox Live to Teams, for some netizens about an hour on April Fools' Day, Redmond has said. Or as the Windows giant put it, the outage was the result of "an anomalous surge in DNS queries from across the globe targeting a set of domains hosted on Azure." In a postmortem examination of the downtime, Microsoft said the flood of requests triggered a programming flaw in its infrastructure that hampere...

The seven deadly sins letting hackers hijack America's govt networks: These unpatched bugs leave systems open
The Register • Shaun Nichols in San Francisco • 12 Oct 2020

'Unauthorized access to elections support systems' detected tho 'no evidence to date that integrity of elections data has been compromised' Big US election coming up, security is vital and, oh look... a federal agency just got completely pwned for real

If you're wondering which bugs in particular miscreants are exploiting to break into, or attempt to break into, US government networks, wonder no more. And then make sure you've patched them. Uncle Sam's Dept of Homeland Security has this month identified at least six possible routes into the nation's computer systems, and the method used to gain total control over the machines once inside. Those six vulnerabilities are... ...plus CVE-2020-1472, aka ZeroLogon, in Microsoft Windows, which is expl...

Five Eyes nations reveal 2021's fifteen most-exploited flaws
The Register • Jessica Lyons Hardcastle • 01 Jan 1970

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Malicious cyber actors go after 2021's biggest misses, spend less time on the classics

Security flaws in Log4j, Microsoft Exchange, and Atlassian's workspace collaboration software were among the bugs most frequently exploited by "malicious cyber actors" in 2021 , according to a joint advisory by the Five Eyes nations' cybersecurity and law enforcement agencies. It's worth noting that 11 of the 15 flaws on the list were disclosed in 2021, as previous years' lists often found miscreants exploiting the older vulns for which patches had been available for years. Of course, the US Cyb...

Russia stole US defense data from IT systems, says CISA
The Register • Simon Sharwood, APAC Editor • 01 Jan 1970

Get our weekly newsletter Clearly no need for leet zero-day hax when you can spearphish and exploit months-old vulnerabilities

A two-year campaign by state-sponsored Russian entities to siphon information from US defense contractors worked, it is claimed. Uncle Sam's Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday said Moscow's cyber-snoops have obtained "significant insight into US weapons platforms development and deployment timelines, vehicle specifications, and plans for communications infrastructure and information technology." The Agency added that the intruders made off with sensitive and unc...

LockBit victims in the US alone paid over $90m in ransoms since 2020
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources As America, UK, Canada, Australia and friends share essential bible to detect and thwart infections

Seven nations today issued an alert, plus protection tips, about LockBit, the prolific ransomware-as-a-service gang. The group's affiliates remains a global scourge, costing US victims alone more than $90 million from roughly 1,700 attacks since 2020, we're told. The joint security advisory — issued by the US Cybersecurity and Infrastructure Security Agency (CISA), FBI, Multi-State Information Sharing and Analysis Center (MS-ISAC), and cybersecurity authorities in Australia, Canada, the UK, Ge...