ID

VAR-201711-1074


CVE

CVE-2017-7739


TITLE

Fortinet FortiOS Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2017-010133

DESCRIPTION

A reflected Cross-site Scripting (XSS) vulnerability in web proxy disclaimer response web pages in Fortinet FortiOS 5.6.0, 5.4.0 to 5.4.5, 5.2.0 to 5.2.11 allows an unauthenticated attacker to inject arbitrary web script or HTML in the context of the victim's browser via sending a maliciously crafted URL to the victim. Fortinet FortiOS Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Fortinet FortiOS is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Fortinet FortiOS 5.2.0 through 5.2.11, 5.4.0 through 5.4.5 and 5.6.0 are vulnerable. Fortinet FortiOS is a set of security operating systems developed by Fortinet Corporation for the FortiGate network security platform. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSL VPN, Web content filtering and anti-spam

Trust: 1.98

sources: NVD: CVE-2017-7739 // JVNDB: JVNDB-2017-010133 // BID: 101679 // VULHUB: VHN-115942

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiosscope:eqversion:5.2.8

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.6

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.5

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.4

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.3

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.2

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.1

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.9

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.2.0

Trust: 1.9

vendor:fortinetmodel:fortiosscope:eqversion:5.6.0

Trust: 1.8

vendor:fortinetmodel:fortiosscope:eqversion:5.2.7

Trust: 1.6

vendor:fortinetmodel:fortiosscope:eqversion:5.4.5

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.4

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.3

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.2

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.1

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.11

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.4.0

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.10

Trust: 1.3

vendor:fortinetmodel:fortiosscope:eqversion:5.2.0 to 5.2.11

Trust: 0.8

vendor:fortinetmodel:fortiosscope:eqversion:5.4.0 to 5.4.5

Trust: 0.8

vendor:fortinetmodel:fortiosscope:eqversion:5.6

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.4.6

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.2.12

Trust: 0.3

vendor:fortinetmodel:fortiosscope:neversion:5.6.1

Trust: 0.3

sources: BID: 101679 // JVNDB: JVNDB-2017-010133 // CNNVD: CNNVD-201711-306 // NVD: CVE-2017-7739

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-7739
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-7739
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201711-306
value: MEDIUM

Trust: 0.6

VULHUB: VHN-115942
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-7739
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-115942
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-7739
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-115942 // JVNDB: JVNDB-2017-010133 // CNNVD: CNNVD-201711-306 // NVD: CVE-2017-7739

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-115942 // JVNDB: JVNDB-2017-010133 // NVD: CVE-2017-7739

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201711-306

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201711-306

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-010133

PATCH

title:FG-IR-17-168url:https://fortiguard.com/psirt/FG-IR-17-168

Trust: 0.8

title:Fortinet FortiOS Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=76203

Trust: 0.6

sources: JVNDB: JVNDB-2017-010133 // CNNVD: CNNVD-201711-306

EXTERNAL IDS

db:NVDid:CVE-2017-7739

Trust: 2.8

db:BIDid:101679

Trust: 2.0

db:SECTRACKid:1039741

Trust: 1.1

db:JVNDBid:JVNDB-2017-010133

Trust: 0.8

db:CNNVDid:CNNVD-201711-306

Trust: 0.7

db:VULHUBid:VHN-115942

Trust: 0.1

sources: VULHUB: VHN-115942 // BID: 101679 // JVNDB: JVNDB-2017-010133 // CNNVD: CNNVD-201711-306 // NVD: CVE-2017-7739

REFERENCES

url:http://www.securityfocus.com/bid/101679

Trust: 1.7

url:https://fortiguard.com/advisory/fg-ir-17-168

Trust: 1.7

url:http://www.securitytracker.com/id/1039741

Trust: 1.1

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7739

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-7739

Trust: 0.8

url:https://www.fortinet.com/products/fortigate/fortios.html

Trust: 0.3

url:http://fortiguard.com/psirt/fg-ir-17-168

Trust: 0.3

sources: VULHUB: VHN-115942 // BID: 101679 // JVNDB: JVNDB-2017-010133 // CNNVD: CNNVD-201711-306 // NVD: CVE-2017-7739

CREDITS

usd AG, Serge Ivanov of Payvision BV and Dhiraj Datar, Paramount Computer Systems.

Trust: 0.9

sources: BID: 101679 // CNNVD: CNNVD-201711-306

SOURCES

db:VULHUBid:VHN-115942
db:BIDid:101679
db:JVNDBid:JVNDB-2017-010133
db:CNNVDid:CNNVD-201711-306
db:NVDid:CVE-2017-7739

LAST UPDATE DATE

2024-08-14T14:05:24.515000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-115942date:2017-11-29T00:00:00
db:BIDid:101679date:2017-12-19T22:36:00
db:JVNDBid:JVNDB-2017-010133date:2017-12-06T00:00:00
db:CNNVDid:CNNVD-201711-306date:2017-11-15T00:00:00
db:NVDid:CVE-2017-7739date:2017-11-29T15:18:38.423

SOURCES RELEASE DATE

db:VULHUBid:VHN-115942date:2017-11-13T00:00:00
db:BIDid:101679date:2017-11-03T00:00:00
db:JVNDBid:JVNDB-2017-010133date:2017-12-06T00:00:00
db:CNNVDid:CNNVD-201711-306date:2017-11-10T00:00:00
db:NVDid:CVE-2017-7739date:2017-11-13T14:29:00.947