Title: ====== Fortigate UTM WAF Appliance - Cross Site Vulnerabilities Date: ===== 2012-09-07 References: =========== http://www.vulnerability-lab.com/get_content.php?id=559 VL-ID: ===== 559 Common Vulnerability Scoring System: ==================================== 3.5 Introduction: ============= The FortiGate series of multi-threat security systems detect and eliminate the most damaging, content-based threats from email and Web traffic such as viruses, worms, intrusions, inappropriate Web content and more in real time - without degrading network performance. Ranging from the FortiGate-30 series for small offices to the FortiGate-5000 series for large enterprises, service providers and carriers, the FortiGate line combines the FortiOS™ security operating system with FortiASIC processors and other hardware to provide a comprehensive and high-performance array of security and networking functions including: * Firewall, VPN, and Traffic Shaping * Intrusion Prevention System (IPS) * Antivirus/Antispyware/Antimalware * Web Filtering * Antispam * Application Control (e.g., IM and P2P) * VoIP Support (H.323. and SCCP) * Layer 2/3 routing * Multiple WAN interface options FortiGate appliances provide cost-effective, comprehensive protection against network, content, and application-level threats - including complex attacks favored by cybercriminals - without degrading network availability and uptime. FortiGate platforms incorporate sophisticated networking features, such as high availability (active/active, active/passive) for maximum network uptime, and virtual domain (VDOM) capabilities to separate various networks requiring different security policies. Fortigate applainces are Pentagon & US Military certified. The military provides high security standards & save outdoor camps, air base, offices with fortigate hardware. (Copy from the Vendor Homepage: http://www.fortinet.com/products/fortigate ) Abstract: ========= Vulnerability-Lab Research Team discovered multiple non-persistent Web Vulnerabilities in the FortiGates UTM Appliance Application. Report-Timeline: ================ 2012-05-07: Researcher Notification & Coordination 2012-05-10: Vendor Notification 2012-06-08: Vendor Response/Feedback 2012-08-30: Vendor Fix/Patch ( FortiOS v4.3.8 B0630 & FortiOS v5.0 B064 ) 2012-09-07: Public or Non-Public Disclosure Status: ======== Published Affected Products: ================== Fortigate Product: UTM Firewall Appliance Application vFortiGate-5000 Series;FortiGate-3950 Series;FortiGate-3810A; Exploitation-Technique: ======================= Remote Severity: ========= Medium Details: ======== Multiple input validation vulnerabilities (non-persistent) are detected in the FortiGates UTM Appliance Application. The vulnerability allows remote attackers to hijack admin/customer sessions with required user inter action (client-side). Successful exploitation allows to phish user accounts, hijacking sessions, redirect over client side requests or manipulate website context on client-side browser requests. Vulnerable Module(s): (Non-Persistent) [+] Exception Handling - objusagedlg [+] WiFi-controller SSID - Topic [+] Display Message - Title & Message Picture(s): ../1.png ../2.png Interface - UTM WAF Web Application [Appliance] FortiGate-5000 Series;FortiGate-3950 Series;FortiGate-3810A;FortiGate-3600A;FortiGate-3016B;FortiGate-1240B FortiGate-800;FortiGate-620B;FortiGate-311B;FortiGate-310B;FortiGate-300A;FortiGate-224B;FortiGate-200B Series Proof of Concept: ================= The non-persistent vulnerability can be exploited by remote attackers with medium or high required user inter action. For demonstration or reproduce ... Code Review: Exception Handling - objusagedlg URL: http://appliance.127.0.0.1:137/objusagedlg?type=220&mkey=
Notice: This is a hack by BKM |