Skip to content

Commit 8062673

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent c3f221e commit 8062673

File tree

1 file changed

+6
-4
lines changed

1 file changed

+6
-4
lines changed

db/modules_metadata_base.json

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2401,18 +2401,20 @@
24012401
"fullname": "auxiliary/admin/http/fortinet_fortiweb_create_admin",
24022402
"aliases": [],
24032403
"rank": 300,
2404-
"disclosure_date": null,
2404+
"disclosure_date": "2025-11-14",
24052405
"type": "auxiliary",
24062406
"author": [
24072407
"Defused",
24082408
"sfewer-r7"
24092409
],
2410-
"description": "This auxiliary module exploits an authentication bypass via path traversal vulnerability in the Fortinet\n FortiWeb management interface to create a new local administrator user account. This vulnerability\n appears to be patched in the latest version of the product, version 8.0.2.",
2410+
"description": "This auxiliary module exploits an authentication bypass via path traversal vulnerability in the Fortinet\n FortiWeb management interface to create a new local administrator user account. This vulnerability affects the\n following versions:\n\n * FortiWeb 8.0.0 through 8.0.1 (Patched in 8.0.2 and above)\n * FortiWeb 7.6.0 through 7.6.4 (Patched in 7.6.5 and above)\n * FortiWeb 7.4.0 through 7.4.9 (Patched in 7.4.10 and above)\n * FortiWeb 7.2.0 through 7.2.11 (Patched in 7.2.12 and above)\n * FortiWeb 7.0.0 through 7.0.11 (Patched in 7.0.12 and above)",
24112411
"references": [
2412+
"CVE-2025-64446",
24122413
"URL-https://x.com/defusedcyber/status/1975242250373517373",
24132414
"URL-https://github.com/watchtowrlabs/watchTowr-vs-Fortiweb-AuthBypass",
24142415
"URL-https://www.pwndefend.com/2025/11/13/suspected-fortinet-zero-day-exploited-in-the-wild/",
2415-
"URL-https://www.rapid7.com/blog/post/etr-critical-vulnerability-in-fortinet-fortiweb-exploited-in-the-wild/"
2416+
"URL-https://www.rapid7.com/blog/post/etr-critical-vulnerability-in-fortinet-fortiweb-exploited-in-the-wild/",
2417+
"URL-https://www.fortiguard.com/psirt/FG-IR-25-910"
24162418
],
24172419
"platform": "",
24182420
"arch": "",
@@ -2433,7 +2435,7 @@
24332435
"https"
24342436
],
24352437
"targets": null,
2436-
"mod_time": "2025-11-14 12:02:10 +0000",
2438+
"mod_time": "2025-11-14 17:06:30 +0000",
24372439
"path": "/modules/auxiliary/admin/http/fortinet_fortiweb_create_admin.rb",
24382440
"is_install_path": true,
24392441
"ref_name": "admin/http/fortinet_fortiweb_create_admin",

0 commit comments

Comments
 (0)