CVE-2022-39952
CRITICAL EXPLOITED IN THE WILD NUCLEIFortinet FortiNAC keyUpload.jsp arbitrary file write
Title source: metasploitDescription
A external control of file name or path in Fortinet FortiNAC versions 9.4.0, 9.2.0 through 9.2.5, 9.1.0 through 9.1.7, 8.8.0 through 8.8.11, 8.7.0 through 8.7.6, 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.3.7 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP request.
Exploits (6)
nomisec
WORKING POC
2 stars
by shiyeshu · remote
https://github.com/shiyeshu/CVE-2022-39952_webshell
metasploit
WORKING POC
EXCELLENT
by Gwendal Guégniaud, Zach Hanley, jheysel-r7 · rubypocunix
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/fortinac_keyupload_file_write.rb
Nuclei Templates (1)
Fortinet FortiNAC - Arbitrary File Write
CRITICALVERIFIEDby dwisiswant0
Shodan:
title:"FortiNAC" || http.title:"fortinac"
FOFA:
title="fortinac"
References (1)
Scores
CVSS v3
9.8
EPSS
0.9378
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-07-05
InTheWild.io
2023-02-23
CWE
CWE-668
CWE-73
Status
published
Products (1)
fortinet/fortinac
8.3.7 - 8.8.9
Published
Feb 16, 2023
Tracked Since
Feb 18, 2026