Fortinet FortiNAC ConfigWizard KeyUpload RCE

Strike ID:
E23-epcg1
CVSS:
9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
False Positive:
f
Variants:
1
Year:
2022

Description

This strike exploits an externally controllable path vulnerability in FortiNAC. This vulnerability is due to an unauthenticated endpoint '/configWizard/keyUpload.jsp' accepting zip file which when unzipped leads to files being written at an attacker controlled path. An unauthenticated remote attacker can send a HTTP packet with zip file which can create a new cron job on the server ultimately leading to remote code execution as the root user.

CVE

References