Skip to content

Commit a960401

Browse files
authored
1 parent 01d37ab commit a960401

File tree

4 files changed

+80
-0
lines changed

4 files changed

+80
-0
lines changed
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
id: CVE-2025-64446
2+
info:
3+
name: CVE-2025-64446
4+
author: crowdsec
5+
severity: info
6+
description: CVE-2025-64446 testing
7+
tags: appsec-testing
8+
http:
9+
#this is a dummy request, edit the request(s) to match your needs
10+
- raw:
11+
- |
12+
POST /api/v2.0/cmdb/system/admin%3f/../../../../../cgi-bin/fwbcgi HTTP/1.1
13+
Host: 127.0.0.1:4242
14+
Accept-Encoding: identity
15+
Content-Length: 824
16+
CGIINFO: eyJ1c2VybmFtZSI6ICJhZG1pbiIsICJwcm9mbmFtZSI6ICJwcm9mX2FkbWluIiwgInZkb20iOiAicm9vdCIsICJsb2dpbm5hbWUiOiAiYWRtaW4ifQ==
17+
Content-Type: application/x-www-form-urlencoded
18+
19+
{"data": {"q_type": 1, "name": "c41e0b38", "access-profile": "prof_admin", "access-profile_val": "0", "trusthostv4": "0.0.0.0/0", "trusthostv6": "::/0", "last-name": "", "first-name": "", "email-address": "", "phone-number": "", "mobile-number": "", "hidden": 0, "comments": "", "sz_dashboard": -1, "type": "local-user", "type_val": "0", "admin-usergrp_val": "0", "wildcard_val": "0", "accprofile-override_val": "0", "sshkey": "", "passwd-set-time": 0, "history-password-pos": 0, "history-password0": "", "history-password1": "", "history-password2": "", "history-password3": "", "history-password4": "", "history-password5": "", "history-password6": "", "history-password7": "", "history-password8": "", "history-password9": "", "force-password-change": "disable", "force-password-change_val": "0", "password": "c41e0b38"}}
20+
cookie-reuse: true
21+
#test will fail because we won't match http status
22+
matchers:
23+
- type: status
24+
status:
25+
- 403
Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
appsec-rules:
2+
- ./appsec-rules/crowdsecurity/vpatch-CVE-2025-64446.yaml
3+
- ./appsec-rules/crowdsecurity/base-config.yaml
4+
nuclei_template: CVE-2025-64446.yaml
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
name: crowdsecurity/vpatch-CVE-2025-64446
2+
description: 'Detects FortiWeb authentication bypass via path traversal and CGIINFO header with admin impersonation'
3+
rules:
4+
- and:
5+
- zones:
6+
- URI
7+
transform:
8+
- urldecode
9+
- lowercase
10+
match:
11+
type: contains
12+
value: '/api/v2.0/cmdb/system/admin'
13+
- zones:
14+
- URI
15+
transform:
16+
- urldecode
17+
- lowercase
18+
match:
19+
type: contains
20+
value: '../'
21+
- zones:
22+
- URI
23+
transform:
24+
- urldecode
25+
- lowercase
26+
match:
27+
type: contains
28+
value: '/cgi-bin/fwbcgi'
29+
- zones:
30+
- HEADERS
31+
variables:
32+
- CGIINFO
33+
transform:
34+
- b64decode
35+
- lowercase
36+
match:
37+
type: contains
38+
value: 'admin'
39+
40+
labels:
41+
type: exploit
42+
service: http
43+
confidence: 3
44+
spoofable: 0
45+
behavior: 'http:exploit'
46+
label: 'FortiWeb - Authentication Bypass'
47+
classification:
48+
- cve.CVE-2025-64446
49+
- attack.T1190
50+
- cwe.CWE-23

collections/crowdsecurity/appsec-virtual-patching.yaml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,7 @@ appsec-rules:
136136
- crowdsecurity/vpatch-CVE-2019-7276
137137
- crowdsecurity/vpatch-CVE-2020-8656
138138
- crowdsecurity/vpatch-CVE-2025-27222
139+
- crowdsecurity/vpatch-CVE-2025-64446
139140
author: crowdsecurity
140141
contexts:
141142
- crowdsecurity/appsec_base

0 commit comments

Comments
 (0)