diff --git a/FortiOS/CVE-2018-13379/CVE-2018-13379_1.png b/FortiOS/CVE-2018-13379/CVE-2018-13379_1.png new file mode 100644 index 0000000..946f07a Binary files /dev/null and b/FortiOS/CVE-2018-13379/CVE-2018-13379_1.png differ diff --git a/FortiOS/CVE-2018-13379/CVE-2018-13379_2.png b/FortiOS/CVE-2018-13379/CVE-2018-13379_2.png new file mode 100644 index 0000000..ab5e37d Binary files /dev/null and b/FortiOS/CVE-2018-13379/CVE-2018-13379_2.png differ diff --git a/FortiOS/CVE-2018-13379/README.md b/FortiOS/CVE-2018-13379/README.md new file mode 100644 index 0000000..83c61c9 --- /dev/null +++ b/FortiOS/CVE-2018-13379/README.md @@ -0,0 +1,13 @@ +# CVE-2018-13379 Fortinet FortiOS CVE-2018-13379 Directory Traversal Vulnerability + +An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests. + +**Affected Version**: Fortinet FortiOS 6.0.0 - 6.0.4, 5.6.3 - 5.6.7 and 5.4.6 - 5.4.12 under SSL VPN web portal + +**[FOFA](https://fofa.so/result?qbase64=YXBwPSJGb3J0aW5ldC1zc2x2cG4i) query rule**: app="Fortinet-sslvpn" + +# Demo + +![](CVE-2018-13379_1.png) + +![](CVE-2018-13379_2.png) \ No newline at end of file