SB2021080312 - Multiple vulnerabilities in Fortinet FortiPortal



SB2021080312 - Multiple vulnerabilities in Fortinet FortiPortal

Published: August 3, 2021

Security Bulletin ID SB2021080312
Severity
Critical
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 14% High 14% Medium 57% Low 14%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Cross-site scripting (CVE-ID: CVE-2021-32602)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in FortiPortal GUI. passed via invalid lang parameter or with an invalid org.springframework.web.servlet.i18n.CookieLocaleResolver.LOCALE value. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Path traversal (CVE-ID: CVE-2021-36168)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in controler. A remote user can send a specially crafted HTTP request and read arbitrary files on the system.


3) Use of a One-Way Hash with a Predictable Salt (CVE-ID: CVE-2021-32596)

The vulnerability allows an attacker to restore password from password hash.

The vulnerability exists due to FortiPortal uses ne-way hash with a predictable salt when storing passwords. An attacker with access to the password hash can restore password from it by means of precomputed tables.


4) Arbitrary file upload (CVE-ID: CVE-2021-32594)

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of files during file upload. A remote user can upload a malicious file to the system and tamper with the underlying system's files.


5) SQL injection (CVE-ID: CVE-2021-32590)

The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to the affected application and execute arbitrary SQL commands within the application database.

Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.


6) Use of hard-coded credentials (CVE-ID: CVE-2021-32588)

The vulnerability allows a remote attacker to gain full access to vulnerable system.

The vulnerability exists due to presence of hard-coded Tomcat Manager username and password in application code. A remote unauthenticated attacker can access the affected system using the hard-coded credentials and execute arbitrary commands as root.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) OS Command Injection (CVE-ID: CVE-2021-26104)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation in the command line interface. A local user can execute arbitrary shell commands as root via specifically crafted CLI command parameters.


Remediation

Install update from vendor's website.