ID

VAR-201311-0370


CVE

CVE-2013-6826


TITLE

Fortinet FortiAnalyzer Vulnerable to cross-site request forgery attacks

Trust: 0.8

sources: JVNDB: JVNDB-2013-005213

DESCRIPTION

cgi-bin/module//sysmanager/admin/SYSAdminUserDialog in Fortinet FortiAnalyzer before 5.0.5 does not properly validate the csrf_token parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks. Exploiting this issue may allow a remote attacker to perform certain unauthorized administrative actions in the context of the device running the affected application. Other attacks are also possible. Versions prior to Fortianalyzer 4.3.7 and 5.0.5 are vulnerable. Fortinet FortiAnalyzer is a centralized network security reporting solution from Fortinet. This solution is mainly used to collect network log data, and analyze, report, and archive the security events, network traffic, and Web content in the logs through the report suite. The vulnerability is caused by the program not filtering the 'csrf_token' parameter correctly

Trust: 1.98

sources: NVD: CVE-2013-6826 // JVNDB: JVNDB-2013-005213 // BID: 63663 // VULHUB: VHN-66828

AFFECTED PRODUCTS

vendor:fortinetmodel:fortianalyzerscope:lteversion:5.0.4

Trust: 1.0

vendor:fortinetmodel:fortianalyzer-1000dscope:eqversion: -

Trust: 1.0

vendor:fortinetmodel:fortianalyzer-200dscope:eqversion: -

Trust: 1.0

vendor:fortinetmodel:fortianalyzer-300dscope:eqversion: -

Trust: 1.0

vendor:fortinetmodel:fortianalyzer-4000bscope:eqversion: -

Trust: 1.0

vendor:fortinetmodel:fortianalyzer-2000bscope:eqversion: -

Trust: 1.0

vendor:fortinetmodel:fortianalyzer-3000dscope:eqversion: -

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:ltversion:5.0.5

Trust: 0.8

vendor:fortinetmodel:fortianalyzer-1000dscope: - version: -

Trust: 0.8

vendor:fortinetmodel:fortianalyzer-2000bscope: - version: -

Trust: 0.8

vendor:fortinetmodel:fortianalyzer-200dscope: - version: -

Trust: 0.8

vendor:fortinetmodel:fortianalyzer-3000dscope: - version: -

Trust: 0.8

vendor:fortinetmodel:fortianalyzer-300dscope: - version: -

Trust: 0.8

vendor:fortinetmodel:fortianalyzer-4000bscope: - version: -

Trust: 0.8

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.4

Trust: 0.6

sources: JVNDB: JVNDB-2013-005213 // CNNVD: CNNVD-201311-181 // NVD: CVE-2013-6826

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6826
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-6826
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201311-181
value: MEDIUM

Trust: 0.6

VULHUB: VHN-66828
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-6826
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-66828
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-66828 // JVNDB: JVNDB-2013-005213 // CNNVD: CNNVD-201311-181 // NVD: CVE-2013-6826

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.9

sources: VULHUB: VHN-66828 // JVNDB: JVNDB-2013-005213 // NVD: CVE-2013-6826

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201311-181

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201311-181

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005213

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-66828

PATCH

title:FortiAnalyzerurl:http://www.fortinet.co.jp/doc/FortiAnalyzer_DS.pdf

Trust: 0.8

sources: JVNDB: JVNDB-2013-005213

EXTERNAL IDS

db:NVDid:CVE-2013-6826

Trust: 2.8

db:PACKETSTORMid:123980

Trust: 2.5

db:BIDid:63663

Trust: 2.0

db:JVNDBid:JVNDB-2013-005213

Trust: 0.8

db:CNNVDid:CNNVD-201311-181

Trust: 0.7

db:EXPLOIT-DBid:38824

Trust: 0.1

db:VULHUBid:VHN-66828

Trust: 0.1

sources: VULHUB: VHN-66828 // BID: 63663 // JVNDB: JVNDB-2013-005213 // CNNVD: CNNVD-201311-181 // NVD: CVE-2013-6826

REFERENCES

url:http://packetstormsecurity.com/files/123980/fortianalyzer-xsrf.txt

Trust: 2.5

url:http://www.securityfocus.com/bid/63663

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6826

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6826

Trust: 0.8

sources: VULHUB: VHN-66828 // JVNDB: JVNDB-2013-005213 // CNNVD: CNNVD-201311-181 // NVD: CVE-2013-6826

CREDITS

William Costa

Trust: 0.9

sources: BID: 63663 // CNNVD: CNNVD-201311-181

SOURCES

db:VULHUBid:VHN-66828
db:BIDid:63663
db:JVNDBid:JVNDB-2013-005213
db:CNNVDid:CNNVD-201311-181
db:NVDid:CVE-2013-6826

LAST UPDATE DATE

2024-11-23T23:12:48.084000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-66828date:2013-11-20T00:00:00
db:BIDid:63663date:2013-11-27T00:25:00
db:JVNDBid:JVNDB-2013-005213date:2013-11-22T00:00:00
db:CNNVDid:CNNVD-201311-181date:2013-11-22T00:00:00
db:NVDid:CVE-2013-6826date:2024-11-21T01:59:47.160

SOURCES RELEASE DATE

db:VULHUBid:VHN-66828date:2013-11-20T00:00:00
db:BIDid:63663date:2013-11-12T00:00:00
db:JVNDBid:JVNDB-2013-005213date:2013-11-22T00:00:00
db:CNNVDid:CNNVD-201311-181date:2013-11-14T00:00:00
db:NVDid:CVE-2013-6826date:2013-11-20T14:12:31.070