CVE-2018-13379
CRITICAL KEV RANSOMWARE NUCLEIFortinet Fortiproxy < 1.2.9 - Path Traversal
Title source: ruleDescription
An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
Exploits (14)
exploitdb
WORKING POC
by Carlos E. Vieira · rubywebappshardware
https://www.exploit-db.com/exploits/47287
exploitdb
WORKING POC
by Carlos E. Vieira · pythonwebappshardware
https://www.exploit-db.com/exploits/47288
nomisec
WORKING POC
8 stars
by Zeop-CyberSec · remote
https://github.com/Zeop-CyberSec/fortios_vpnssl_traversal_leak
nomisec
WORKING POC
6 stars
by 0xHunter · remote
https://github.com/0xHunter/FortiOS-Credentials-Disclosure
Nuclei Templates (1)
Fortinet FortiOS - Credentials Disclosure
CRITICALVERIFIEDby organiccrap
Shodan:
http.html:"/remote/login" "xxxxxxxx" || http.favicon.hash:945408572 || cpe:"cpe:2.3:o:fortinet:fortios" || port:10443 http.favicon.hash:945408572
FOFA:
body="/remote/login" "xxxxxxxx" || icon_hash=945408572
Scores
CVSS v3
9.1
EPSS
0.9445
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2019-10-02
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2018-5323
Ransomware Use
Confirmed
CWE
CWE-22
Status
published
Products (3)
fortinet/fortios
5.4.6 - 5.4.13
fortinet/fortiproxy
2.0.0
fortinet/fortiproxy
< 1.2.9
Published
Jun 04, 2019
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026