Lucene search

K
packetstormWilliam CostaPACKETSTORM:125049
HistoryFeb 04, 2014 - 12:00 a.m.

FortiWeb 5.0.3 Cross Site Scripting

2014-02-0400:00:00
William Costa
packetstormsecurity.com
39

EPSS

0.004

Percentile

74.8%

`I. VULNERABILITY  
  
-------------------------  
  
XSS Reflected vulnerabilities in OS of FortiWeb v 5.0.3  
  
CVE-2013-7181 <http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-7181>  
  
  
II. BACKGROUND  
  
-------------------------  
  
Fortinet's industry-leading, Network Security Platforms deliver Next  
Generation Firewall (NGFW) security with exceptional throughput, ultra  
low latency, and multi-vector threat protection.  
  
  
  
III. DESCRIPTION  
  
-------------------------  
  
Has been detected a XSS Reflected vulnerability in Fortiweb in "  
/user/ldap_user/add" parameter "filter" 5.0.3 , that allows the  
execution of arbitrary HTML/script code to be executed in the context  
of the victim user's browser and/or Session Hijacking attack  
  
  
  
  
  
IV. PROOF OF CONCEPT  
  
-------------------------  
  
The application does not validate the parameter filter in "  
/user/ldap_user/add".  
  
  
  
  
V. BUSINESS IMPACT  
  
-------------------------  
  
  
  
That allows the execution attackers to hijack the authentication of  
administrators.  
  
  
  
VI. REQUIREMENTS  
  
-----------------------  
  
An Attacker needs to know the IP of the device.  
  
An Administrator needs an authenticated connection to the device.  
  
  
  
VII. SYSTEMS AFFECTED  
  
-------------------------  
  
Try FortiWEB VM or appliance v5.0.3  
  
  
  
  
  
VIII. SOLUTION  
  
-------------------------  
  
Upgrade to FortiWeb 5.1.0 or higher.  
  
  
By William Costa  
`

EPSS

0.004

Percentile

74.8%