cve/2024/CVE-2024-47575.md
2025-09-29 21:09:30 +02:00

60 lines
3.0 KiB
Markdown

### [CVE-2024-47575](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47575)
![](https://img.shields.io/static/v1?label=Product&message=FortiManager&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=6.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.6.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Execute%20unauthorized%20code%20or%20commands&color=brightgreen)
### Description
A missing authentication for critical function in FortiManager 7.6.0, FortiManager 7.4.0 through 7.4.4, FortiManager 7.2.0 through 7.2.7, FortiManager 7.0.0 through 7.0.12, FortiManager 6.4.0 through 6.4.14, FortiManager 6.2.0 through 6.2.12, Fortinet FortiManager Cloud 7.4.1 through 7.4.4, FortiManager Cloud 7.2.1 through 7.2.7, FortiManager Cloud 7.0.1 through 7.0.12, FortiManager Cloud 6.4.1 through 6.4.7 allows attacker to execute arbitrary code or commands via specially crafted requests.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/12442RF/POC
- https://github.com/20142995/nuclei-templates
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/AnnnNix/CVE-2024-47575
- https://github.com/DMW11525708/wiki
- https://github.com/HazeLook/CVE-2024-47575
- https://github.com/Laonhearts/CVE-2024-47575-POC
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/SkyGodling/exploit-cve-2024-47575
- https://github.com/Threekiii/CVE
- https://github.com/XiaomingX/awesome-cve-exp-poc
- https://github.com/XiaomingX/cve-2024-47575-exp
- https://github.com/adysec/POC
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/expl0itsecurity/CVE-2024-47575
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/groshi/CVE-2024-47575-POC
- https://github.com/hazesecurity/CVE-2024-47575
- https://github.com/iemotion/POC
- https://github.com/krmxd/CVE-2024-47575
- https://github.com/laoa1573/wy876
- https://github.com/maybelookis/CVE-2024-47575
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/plbplbp/loudong001
- https://github.com/revanslbw/CVE-2024-47575-POC
- https://github.com/skyalliance/exploit-cve-2024-47575
- https://github.com/tylzars/awesome-vrre-writeups
- https://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/zgimszhd61/CVE-2024-47575-POC
- https://github.com/zhanpengliu-tencent/medium-cve
- https://github.com/zulloper/cve-poc
- https://github.com/zxarj/wxvl