SB2015020303 - Multiple vulnerabilities in Fortinet, FortiAuthenticator
Published: February 3, 2015 Updated: February 14, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2015-1459)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in Fortinet FortiAuthenticator 3.0.0 when processing operation parameter to cert/scep/. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2015-1458)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Fortinet FortiAuthenticator 3.0.0 allows local users to bypass intended restrictions and gain privileges by creating /tmp/privexec/dbgcore_enable_shell_access and executing the "shell" command.
3) Information disclosure (CVE-ID: CVE-2015-1457)
The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.
Fortinet FortiAuthenticator 3.0.0 allows local users to read arbitrary files via the -f flag to the dig command.
4) Information disclosure (CVE-ID: CVE-2015-1456)
The vulnerability allows a remote #AU# to gain access to sensitive information.
Fortinet FortiAuthenticator 3.0.0 logs the PostgreSQL usernames and passwords in cleartext, which allows remote administrators to obtain sensitive information by reading the log at debug/startup/.
5) Credentials management (CVE-ID: CVE-2015-1455)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Fortinet FortiAuthenticator 3.0.0 has a password of (1) slony for the slony PostgreSQL user and (2) www-data for the www-data PostgreSQL user, which makes it easier for remote attackers to obtain access via unspecified vectors.
Remediation
Install update from vendor's website.
References
- http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html
- http://secunia.com/advisories/62836
- http://www.fortiguard.com/advisory/FG-IR-15-003/
- http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf
- http://www.securityfocus.com/bid/72378
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100561
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100559
- https://exchange.xforce.ibmcloud.com/vulnerabilities/100560