-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add detection for CVE-2024-47575 #137
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good job pulling this detection together 👍
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #137 +/- ##
==========================================
- Coverage 96.46% 96.13% -0.34%
==========================================
Files 176 178 +2
Lines 6287 6393 +106
==========================================
+ Hits 6065 6146 +81
- Misses 222 247 +25 ☔ View full report in Codecov by Sentry. 🚨 Try these New Features:
|
if remote_id != "": | ||
vulnerability = self._create_vulnerability(target) | ||
vulnerabilities.append(vulnerability) | ||
except (UnicodeDecodeError, IndexError, ValueError): | ||
return vulnerabilities | ||
|
||
return vulnerabilities |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why are we using list if we only append one vulnerability? if we need it to be a list maybe we can do `return [vulnerability]? and can we return directly without appending? since it seem that we only return once
except TimeoutError: | ||
return b"" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
shouldn't we add an error logging here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1
This PR introduces detection logic for CVE-2024-47575, a critical vulnerability in FortiManager caused by missing authentication for critical functions.
Detection Mechanism
The
check
function performs the following steps to determine if the target is vulnerable:get ip
andget auth
requests to establish the session.get file_exchange
request includes a non-emptyremoteid
value, the target is identified as vulnerable, and a finding is reported.remoteid
is missing or empty, no vulnerabilities are reported.