FortiWeb vulnerability actively exploited to create admin accounts
Briefly

FortiWeb vulnerability actively exploited to create admin accounts
"A vulnerability in Fortinet FortiWeb is being actively exploited worldwide to create new administrator accounts without authentication on devices that are directly accessible from the internet. This involves a path traversal that makes it possible to call an internal CGI script via the management path. Researchers have observed attackers scanning large numbers of devices and bombarding them with automated requests, immediately affecting any system with an open management interface."
"The way the exploit is executed is relatively simple. Attackers send a POST request to the endpoint "/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi". The path traversal causes the device to execute the underlying CGI function, after which the payload creates a new local administrator account. Researchers have seen multiple usernames created in this way. Examples include Testpoint, trader, and trader1. Passwords such as 3eMIXX43 and AFT3$tH4ck also appeared in the logs of affected systems."
"According to BleepingComputer, the bug has now been fixed in FortiWeb 8.0.2, a version that was released at the end of October. However, Fortinet has not published any information explaining exactly what has been repaired. There is no CVE, no PSIRT advisory, and no explanation of the nature or severity of the vulnerability. As a result, there is a good chance that organizations realized too late that the update contained a security patch and that they used vulnerable systems for weeks or even months."
Attackers exploit a path traversal in Fortinet FortiWeb to invoke an internal CGI script and create local administrator accounts without authentication on internet-accessible devices. The exploit uses a POST to "/api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi" to trigger the CGI and install new accounts. Observed usernames include Testpoint, trader, and trader1 with passwords such as 3eMIXX43 and AFT3$tH4ck. FortiWeb 8.0.2 contains a fix released at the end of October, but Fortinet has not published details, a CVE, or a PSIRT advisory. Large-scale global scanning and spray campaigns target publicly accessible FortiWeb management interfaces.
Read at Techzine Global
Unable to calculate read time
[
|
]