cve/2024/CVE-2024-55591.md
2025-09-29 21:09:30 +02:00

42 lines
2.1 KiB
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-55591](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55591)
![](https://img.shields.io/static/v1?label=Product&message=FortiOS&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=FortiProxy&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=7.2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Execute%20unauthorized%20code%20or%20commands&color=brightgreen)
### Description
An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin privileges via crafted requests to Node.js websocket module.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0x7556/CVE-2024-55591
- https://github.com/20142995/nuclei-templates
- https://github.com/AlgoSecure/2025-fortigate-leak-checker
- https://github.com/Ostorlab/KEV
- https://github.com/UMChacker/CVE-2024-55591-POC
- https://github.com/binarywarm/exp-cmd-add-admin-vpn-CVE-2024-55591
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/exfil0/CVE-2024-55591-POC
- https://github.com/k8gege/Ladon
- https://github.com/packetinside/CISA_BOT
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/rawtips/CVE-2024-55591
- https://github.com/rxerium/stars
- https://github.com/souzatyler/fortios-auth-bypass-check-CVE-2024-55591
- https://github.com/sysirq/fortios-auth-bypass-exploit-CVE-2024-55591
- https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591
- https://github.com/tadmaddad/fortidig
- https://github.com/tanjiti/sec_profile
- https://github.com/ums91/CISA_BOT
- https://github.com/virus-or-not/CVE-2024-55591
- https://github.com/watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591
- https://github.com/watchtowrlabs/fortios-auth-bypass-poc-CVE-2024-55591
- https://github.com/zulloper/cve-poc