CVE-2024-23671

8.1 HIGH

📋 TL;DR

This path traversal vulnerability in Fortinet FortiSandbox allows attackers to execute arbitrary code or commands via specially crafted HTTP requests. It affects FortiSandbox versions 4.4.0-4.4.3, 4.2.1-4.2.6, and 4.0.0-4.0.4. Attackers can potentially gain unauthorized access and control over affected systems.

💻 Affected Systems

Products:
  • Fortinet FortiSandbox
Versions: 4.4.0 through 4.4.3, 4.2.1 through 4.2.6, 4.0.0 through 4.0.4
Operating Systems: FortiSandbox OS
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions in default configuration are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to execute arbitrary commands, install malware, exfiltrate data, and pivot to other network resources.

🟠

Likely Case

Unauthorized command execution leading to data theft, system manipulation, or deployment of ransomware/backdoors.

🟢

If Mitigated

Limited impact due to network segmentation, strict access controls, and monitoring preventing successful exploitation.

🌐 Internet-Facing: HIGH - HTTP-based attack vector makes internet-facing instances particularly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Still significant risk from internal threats or compromised internal systems, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Crafted HTTP requests can trigger the vulnerability without authentication. The path traversal nature suggests relatively straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiSandbox 4.4.4, 4.2.7, 4.0.5 and later

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-454

Restart Required: Yes

Instructions:

1. Download the appropriate firmware update from Fortinet support portal. 2. Backup current configuration. 3. Apply firmware update via web interface or CLI. 4. Reboot the FortiSandbox appliance. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict HTTP/HTTPS access to FortiSandbox management interface to trusted IP addresses only.

config system interface
edit <interface_name>
set allowaccess https
set trust-ip-only enable
set trust-ip <trusted_ip_range>
end

Web Application Firewall Rules

all

Implement WAF rules to block path traversal patterns in HTTP requests.

config webfilter profile
edit <profile_name>
config web
set blocklist enable
set blocklist-pattern "..\\/"
set blocklist-pattern "%2e%2e%2f"
end
end

🧯 If You Can't Patch

  • Isolate FortiSandbox on separate VLAN with strict firewall rules allowing only necessary traffic
  • Implement network-based intrusion detection/prevention systems to monitor for path traversal attempts

🔍 How to Verify

Check if Vulnerable:

Check FortiSandbox firmware version via web interface (System > Dashboard) or CLI command 'get system status'

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify firmware version is 4.4.4+, 4.2.7+, or 4.0.5+ and test with authorized path traversal test cases

📡 Detection & Monitoring

Log Indicators:

  • HTTP requests containing path traversal sequences (../, ..\, %2e%2e%2f)
  • Unusual command execution logs
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • HTTP requests with unusual path parameters
  • Traffic to FortiSandbox management interface from unexpected sources
  • Outbound connections from FortiSandbox to suspicious destinations

SIEM Query:

source="fortisandbox" AND (http_uri="*../*" OR http_uri="*%2e%2e%2f*" OR http_uri="*..\\*")

🔗 References

📤 Share & Export