Document Title: =============== Fortigate UTM WAF Appliance - Multiple Vulnerabilities References (Source): ==================== http://vulnerability-lab.com/get_content.php?id=144 http://www.cnnvd.org.cn/vulnerability/show/cv_id/2012010446 ID: CNNVD-201201-446 http://www.fortiguard.com/advisory/FGA-2012-02.html http://securitytracker.com/id/1026594 http://www.securityfocus.com/bid/51708/info http://www.redoracle.eu/index.php?option=com_vuln&task=view&id=51708 http://www.sans.org/newsletters/risk/display.php?v=11&i=5&rss=Y#12.5.24 http://packetstormsecurity.org/files/109168/VL-144.txt https://xforce.iss.net/xforce/xfdb/72761 Release Date: ============= 2012-01-26 Vulnerability Laboratory ID (VL-ID): ==================================== 144 Common Vulnerability Scoring System: ==================================== 6.1 Vulnerability Class: ==================== Multiple Current Estimated Price: ======================== 3.000€ - 4.000€ Product & Service Introduction: =============================== The FortiGate series of multi-threat security systems detect and eliminate the most damaging, content-based threats from email and Web traffic such as viruses, worms, intrusions, inappropriate Web content and more in real time - without degrading network performance. Ranging from the FortiGate-30 series for small offices to the FortiGate-5000 series for large enterprises, service providers and carriers, the FortiGate line combines the FortiOS™ security operating system with FortiASIC processors and other hardware to provide a comprehensive and high-performance array of security and networking functions including: * Firewall, VPN, and Traffic Shaping * Intrusion Prevention System (IPS) * Antivirus/Antispyware/Antimalware * Web Filtering * Antispam * Application Control (e.g., IM and P2P) * VoIP Support (H.323. and SCCP) * Layer 2/3 routing * Multiple WAN interface options FortiGate appliances provide cost-effective, comprehensive protection against network, content, and application-level threats - including complex attacks favored by cybercriminals - without degrading network availability and uptime. FortiGate platforms incorporate sophisticated networking features, such as high availability (active/active, active/passive) for maximum network uptime, and virtual domain (VDOM) capabilities to separate various networks requiring different security policies. (Copy from the Vendor Homepage: http://www.fortinet.com/products/fortigate/ && http://www.avfirewalls.com/) Abstract Advisory Information: ============================== 1.1 Vulnerability-Lab Team discovered multiple persistent Web Vulnerabilities on the FortiGate UTM Appliance Application. 1.2 Vulnerability-Lab Team discovered multiple non-persistent Web Vulnerabilities on the FortiGate UTM Appliance Application. Vulnerability Disclosure Timeline: ================================== 2012-01-27: Public or Non-Public Disclosure Discovery Status: ================= Published Exploitation Technique: ======================= Remote Severity Level: =============== Medium Authentication Type: ==================== Restricted Authentication (Guest Privileges) User Interaction: ================= Low User Interaction Disclosure Type: ================ Independent Security Research Technical Details & Description: ================================ 1.1 Multiple input validation vulnerabilities(persistent) are detected on FortGate UTM Appliance Series. Remote attacker can include (persistent) malicious script code to manipulate specific customer/admin requests. The vulnerability allows an local low privileged attacker to manipulate the appliance(application) via persistent script code inject. It is also possible to hijack customer sessions via persistent script code execution on application-side. Successful exploitation can also result in content/module request manipulation, execution of persistent malicious script code, session hijacking, account steal & phishing. Vulnerable Module(s): (Persistent) [+] Endpoint - Monitor - Endpoint Monitor [+] Dailup List [+] Log&Report - Display Picture(s): ../ive2.png ../ive3.png 1.2 Multiple input validation vulnerabilities(non-persistent) are detected on FortGate UTM Appliance Series. The vulnerability allows remote attackers to hijack admin/customer sessions with required user inter action (client-side). Successful exploitation allows to phish user accounts, redirect over client side requests or manipulate website context on client-side browser requests. Vulnerable Module(s): (Non-Persistent) [+] Endpoint - NAC - Application Database - Listings [+] List field sorted Picture(s): ../ive1.png Interface - UTM WAF Web Application [Appliance] FortiGate-5000 Series;FortiGate-3950 Series;FortiGate-3810A;FortiGate-3600A;FortiGate-3016B;FortiGate-1240B FortiGate-800;FortiGate-620B;FortiGate-311B;FortiGate-310B;FortiGate-300A;FortiGate-224B;FortiGate-200B Series Proof of Concept (PoC): ======================= The vulnerabilities can be exploited by remote attackers with or without user inter action. For demonstration or reproduce ... 1.1 Code Review: Log&Report =>Display (Persistent) Url: https://fortigate.com/log/display?log=clog&content_type=FTP ...
# | ![]() | ![]() |
![]() | ![]() | ![]() | ![]() |
![]() " >"< ');" onmouseout="nd();" onclick="wij_display_modal_dlg ('/log/display?log=clog&frame=filter&field_name=cstatus&content_type=FTP&device=2', { 'width': 610, 'height': 430 });"> Content Status |
![]() |
![]() |
---|