Rapid7 Vulnerability & Exploit Database

Fortinet FortiNAC keyUpload.jsp arbitrary file write

Back to Search

Fortinet FortiNAC keyUpload.jsp arbitrary file write

Disclosed
02/16/2023
Created
03/14/2023

Description

This module uploads a payload to the /tmp directory in addition to a cron job to /etc/cron.d which executes the payload in the context of the root user. The core vulnerability is an arbitrary file write issue in /configWizard/keyUpload.jsp which is accessible remotely and without authentication. When you send the vulnerable endpoint a ZIP file, it will extract an attacker controlled file to a directory of the attackers choice on the target system. This issue is exploitable on the following versions of FortiNAC: FortiNAC version 9.4 prior to 9.4.1 FortiNAC version 9.2 prior to 9.2.6 FortiNAC version 9.1 prior to 9.1.8 FortiNAC 8.8 all versions FortiNAC 8.7 all versions FortiNAC 8.6 all versions FortiNAC 8.5 all versions FortiNAC 8.3 all versions

Author(s)

  • Gwendal Guégniaud
  • Zach Hanley
  • jheysel-r7

Platform

Linux,Unix

Architectures

cmd, x64, x86

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/http/fortinac_keyupload_file_write
msf exploit(fortinac_keyupload_file_write) > show targets
    ...targets...
msf exploit(fortinac_keyupload_file_write) > set TARGET < target-id >
msf exploit(fortinac_keyupload_file_write) > show options
    ...show and set options...
msf exploit(fortinac_keyupload_file_write) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;