Set of mysql queries in a database management software. Querying

Fortinet WAF allows remote code execution


25th August 2021

2 min read

A new exploit discovered in Fortinet’s Web application firewall (WAF) solution, FortiWeb, is currently vulnerable to command injection. The vulnerability, affecting versions 6.3.11 and prior, was discovered and reported by a Rapid7 researcher, William Wu. This type of attack has a CVSSv3 base score of 8.7.

The vulnerability requires authentication, but once authenticated, attackers can issue arbitrary commands on the system through the SAML interface as the root user. Wu noted in his writeup that whilst authentication is necessary, this vulnerability could be chained with another method of bypassing authentication (such as CVE-2020-29015), in which the FortiWeb Web Application Firewall is vulnerable to blind SQL injection.

According to the writeup, the research into this exploit would allow an attacker to “take complete control of the affected device, with the highest possible privileges”. Wu has published a Proof of Concept (PoC) code showing the use of HTTP request smuggling, using backticks to smuggle the commands.

Unfortunately, the disclosure of this research seems to have occurred before Fortinet anticipated. Fortinet noted they had expected Rapid7 to hold any of their findings to the end of their 90-day responsible disclosure window.

However, Rapid7 operates a 60-day disclosure policy and chose to disclose this vulnerability after 60 days had passed. Fortinet has indicated that their latest update, FortiWeb 6.4.1, is expected to be released at the end of August and include a fix. The PoC code exists and no patch is available in the meantime. This provides limited options for defenders to protect Fortinet devices in the meantime.

In the interim, users should remove the FortiWeb device management interface from untrusted networks. Generally, any management interface will provide access to sensitive information and administrative functionality, and should not be exposed to reduce the likelihood of compromise. Access should only be possible via trusted, internal networks or over secure VPN.

Sentrium can assist with your security needs, view our penetration testing services for more details or contact us today.


  • Insights
  • Labs
White box penetration testing

Uncovering vulnerabilities with white box penetration testing

As a business owner or IT professional, you understand the importance of protecting your company’s sensitive data, systems and reputation from cyber threats. One of…

API penetration testing

Securing APIs through penetration testing

APIs (Application Programming Interfaces) have become the backbone of many modern applications, and indeed the foundation of some businesses services. APIs enable seamless communication between…

The importance of a post-penetration test action plan

The importance of a post-penetration test action plan

As cyber threats continue to evolve and become more sophisticated, businesses must stay one step ahead in protecting their sensitive data and network infrastructure. Penetration…

How to choose the right penetration testing partner

How to choose the right penetration testing partner for your business

In today’s digital landscape, cybersecurity threats are evolving at an alarming rate. With the growing number of cyber-attacks and data breaches, businesses must prioritise their…

IoT device security, penetration testing

Securing the Internet of Things: Penetration testing’s role in IoT device security

The world is witnessing a remarkable transformation as more devices become interconnected, forming what’s known as the Internet of Things (IoT). From smart refrigerators and…

Man working as a junior penetration tester

My first month working as a junior penetration tester

Entering the world of cyber security as a junior penetration tester has been an eye-opening experience for me. In my first month, I’ve encountered challenges,…

Password cracking: How to crack a password

An introduction to password security: How to crack a password

Online Password Cracking An online attack is performed in real-time, against live services or applications to compromise active user accounts. Such attacks typically occur when…

Application Security 101 – HTTP headers

Application Security 101 – HTTP Headers Information Disclosure

Server Header Information Disclosure The most common HTTP header that is enabled by default in most web servers is the ‘Server’ header, which can lead…

SPF, DKIM, DMARC and BIMI for Email Security

SPF, DKIM, DMARC and BIMI for Email Security

Sender Policy Framework Sender Policy Framework (SPF) is a DNS TXT record that is added to a domain that tells email recipients which IP addresses…

Terraform security best practices

Terraform security best practices (2022)

The following sections discuss our most important Terraform security best practices: The importance of Terraform State Terraform must keep track of the resources created. When…

Security vulnerability in Follina exploit

Preventing exploitation of the Follina vulnerability in MSDT

The Follina Exploit A zero-click Remote Code Execution (RCE) vulnerability has started making the rounds which is leveraging functionality within applications such as Microsoft Word.…

Application Security 101 – HTTP headers

Application Security 101 – HTTP headers

1. Strict-Transport-Security The HTTP Strict Transport Security (HSTS) header forces browsers and other agents to interact with web servers over the encrypted HTTPS protocol, which…