TL;DR

Fortinet FortiSandbox SSRF vulnerability allows RCE with valid credentials, rated high severity by ZDI.

What happened

['Remote attackers can exploit a server-side request forgery flaw to execute commands on affected systems']

Why it matters for ops

['Lack of input validation in HTTP requests allows malicious actors to disclose sensitive data and control server processes']

Mitigation

  • Apply vendor-provided security patches immediately
  • Monitor and restrict outgoing HTTP requests
  • Implement robust input validation on all user-supplied data

Action items

  • Review system configurations for FortiSandbox installations
  • Update systems to the latest version with patched SSRF vulnerability

Detection IOCs

  • Unexpected outbound network traffic from affected servers
  • HTTP requests to unexpected domains or IP addresses

Source link

http://www.zerodayinitiative.com/advisories/ZDI-26-048/