Metasploit Wrap-Up 11/21/2025 #1611
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This post describes the Metasploit Framework 6.4.98 → 6.4.99 changes, focusing on a new exploit path for Fortinet FortiWeb (CVE-2025-64446) and new Windows persistence tooling, plus several framework enhancements, bug fixes, and documentation updates.
CVE-2025-64446 – Fortinet FortiWeb auth bypass and RCE chaining
CVE-2025-64446 is a critical (CVSS 9.1) authentication bypass in Fortinet’s FortiWeb Web Application Firewall Manager interface and its WebSocket-based CLI. Th...
🔧 Technical Details
FortiWeb auth bypass → admin account creation → root RCE chain
The core trick is to leverage an authentication bypass (CVE-2025-64446) in FortiWeb’s Manager/WebSocket CLI to run privileged management actions without credentials. By replaying or emulating Defused’s HTTP/WebSocket sequence (automated by Metasploit’s
admin/http/fortinet_fortiweb_create_adminmodule), an attacker can call internal admin functionality such as “create local admin user”. Once the attacker logs in with this new account, any authenticated command-injection bug (e.g. CVE-2025-58034) reachable from the Manager UI or CLI can be used to execute arbitrary OS commands as root, turning an external WAF into a fully compromised pivot host.Service-based Windows persistence via PowerShell or sc.exe
The Windows service persistence technique creates or reconfigures a Windows service so that its
ImagePath(or equivalent configuration) points to an attacker-cont...🤖 Agent Actions
Summary:
admin/http/fortinet_fortiweb_create_adminmodule, described how to chain CVE-2025-64446 with the upcoming CVE-2025-58034 command-injection exploit for root RCE, added operational steps, new detection cues for WebSocket/CLI abuse, and cited the Rapid7 wrap-up.sc.exe(aligned with the refactoredwindows/persistence/servicemodule) and WSL-backed Run/RunOnce persistence, including commands, defensive considerations, and a pointer to autorun locations, plus referenced the Rapid7 source.Testing:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.