Pre-auth SQL Injection to RCE in Fortinet FortiWeb Fabric Co... #1100
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
FortiWeb Fabric Connector SQL Injection and Pre-Auth RCE (CVE-2025-25257)
Overview
Fortinet’s FortiWeb Fabric Connector integrates
FortiWeb
with other Fortinet products via HTTP handlers such as/api/fabric/device/status
,/api/fabric/authenticate
and/api/vX/fabric/widget
.Affected Versions and Fixes
7.0.0–7.0.10
,7.2.0–7.2.10
,7.4....
-
-
- Content is technically accurate
- Formatting follows HackTricks style guidelines
- Links and references are working
- Content adds educational value
- No sensitive information is exposed
- MD files processed: 848
- MD files fixed: 4
🔧 Technical Details
A SQL injection arises in
get_fabric_user_by_token
because unvalidated token input is embedded into a MySQL query viasnprintf
, permitting arbitrary SQL execution.MySQL comment tokens (
/**/
) bypass the space-based filtering of__isoc23_sscanf
, enabling injection ofsleep()
and boolean (OR '1'='1'
) payloads without spaces.The
INTO OUTFILE
statement provides an arbitrary file-write...🤖 Agent Actions
Added advanced MySQL SQL-Injection → RCE techniques from watchTowr FortiWeb research:
src/network-services-pentesting/pentesting-mysql.md
• Expanded “MySQL File RCE” with detailed INTO OUTFILE-to-Python .pth exploitation, filters/limits bypass and practical payloads.
• Added “## References” section including the blog URL.
src/pentesting-web/sql-injection/mysql-injection/README.md
• Inserted new “Injection without SPACES (
/**/
comment trick)” subsection under WAF bypass, explaining comment-based space bypass used in FortiWeb.• Updated “Other MySQL injection guides” bullet and refreshed “## References” with both the classic cheatsheet and the new blog article.
These updates integrate the novel techniques (space-less comment injections and INTO OUTFILE → .pth R...
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).