""ET EXPLOIT FortiOS SSL VPN - Remote Code Execution (CVE-2018-13383)""

SID: 2027891

Revision: 2

Class Type: attempted-admin

Metadata: affected_product Fortigate, attack_target Networking_Equipment, created_at 2019_08_14, deployment Perimeter, performance_impact Low, signature_severity Major, updated_at 2019_08_15, mitre_tactic_id TA0001, mitre_tactic_name Initial_Access, mitre_technique_id T1190, mitre_technique_name Exploit_Public_Facing_Application

Reference:

Protocol: tcp

Source Network: $EXTERNAL_NET

Source Port: $HTTP_PORTS

Destination Network: $HOME_NET

Destination Port: any

Flow: established,to_client

Contents:

  • Value: "200"

  • Value: "|3c|a href=|22|javascript:void|28|0|29 3b|AAA" Depth: 33

  • Value: "python -c"

  • Value: "socket"

Within:

PCRE: "/A{1000}/R"

Special Options:

  • http_stat_code

  • file_data

source