ID

VAR-201905-0763


CVE

CVE-2018-13375


TITLE

Fortinet FortiAnalyzer and FortiManager Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2018-015553

DESCRIPTION

An Improper Neutralization of Script-Related HTML Tags in Fortinet FortiAnalyzer 5.6.0 and below and FortiManager 5.6.0 and below allows an attacker to send DHCP request containing malicious scripts in the HOSTNAME parameter. The malicious script code is executed while viewing the logs in FortiAnalyzer and FortiManager (with FortiAnalyzer feature enabled). Fortinet FortiAnalyzer and FortiManager Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Fortinet FortiManager and FortiAnalyzer are prone to an cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Other attacks are also possible. The following products are affected: FortiManager 5.6.0 and prior FortiAnalyzer 5.6.0 and prior. Both Fortinet FortiManager and Fortinet FortiAnalyzer are products of Fortinet. Fortinet FortiManager is a centralized network security management platform. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management. Fortinet FortiAnalyzer is a centralized network security reporting solution. This product is mainly used to collect network log data, and analyze, report, and archive the security events, network traffic, and Web content in the logs through the report suite. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code

Trust: 1.98

sources: NVD: CVE-2018-13375 // JVNDB: JVNDB-2018-015553 // BID: 108502 // VULHUB: VHN-123428

AFFECTED PRODUCTS

vendor:fortinetmodel:fortianalyzerscope:lteversion:5.6.0

Trust: 1.8

vendor:fortinetmodel:fortimanagerscope:lteversion:5.6.0

Trust: 1.8

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.8

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.12

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.12

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.2.3

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4.2

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.6

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.8

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.6

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.7

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.6

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.1

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.2

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.13

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.2.2

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.3

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.5

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.2.5

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.5

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.5

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.4

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4.1

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:4.3.7

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.4.1

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:neversion:5.6.1

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.7

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.7

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:neversion:5.6.1

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.2.1

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.1

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.11

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.11

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.4

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.2

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.9

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.2.6

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.9

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.10

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:4.3.6

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:3.0

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4.4

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.10

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:4.3

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:3.0

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.6

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.4

Trust: 0.3

vendor:fortinetmodel:fortianalyzerscope:eqversion:5.0.4

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.4

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.3

Trust: 0.3

sources: BID: 108502 // JVNDB: JVNDB-2018-015553 // NVD: CVE-2018-13375

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-13375
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-13375
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201905-1045
value: MEDIUM

Trust: 0.6

VULHUB: VHN-123428
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-13375
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-123428
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-13375
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-123428 // JVNDB: JVNDB-2018-015553 // CNNVD: CNNVD-201905-1045 // NVD: CVE-2018-13375

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-123428 // JVNDB: JVNDB-2018-015553 // NVD: CVE-2018-13375

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-1045

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-201905-1045

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-015553

PATCH

title:FG-IR-18-121url:https://fortiguard.com/advisory/FG-IR-18-121

Trust: 0.8

title:Fortinet FortiManager and Fortinet FortiAnalyzer Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92994

Trust: 0.6

sources: JVNDB: JVNDB-2018-015553 // CNNVD: CNNVD-201905-1045

EXTERNAL IDS

db:NVDid:CVE-2018-13375

Trust: 2.8

db:JVNDBid:JVNDB-2018-015553

Trust: 0.8

db:CNNVDid:CNNVD-201905-1045

Trust: 0.7

db:BIDid:108502

Trust: 0.3

db:VULHUBid:VHN-123428

Trust: 0.1

sources: VULHUB: VHN-123428 // BID: 108502 // JVNDB: JVNDB-2018-015553 // CNNVD: CNNVD-201905-1045 // NVD: CVE-2018-13375

REFERENCES

url:https://fortiguard.com/advisory/fg-ir-18-121

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2018-13375

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13375

Trust: 0.8

url:https://www.fortinet.com/

Trust: 0.3

url:https://fortiguard.com/psirt/fg-ir-18-121

Trust: 0.3

sources: VULHUB: VHN-123428 // BID: 108502 // JVNDB: JVNDB-2018-015553 // CNNVD: CNNVD-201905-1045 // NVD: CVE-2018-13375

CREDITS

Adrian Dabrowski of SBA Research gGmbH Sitz.

Trust: 0.3

sources: BID: 108502

SOURCES

db:VULHUBid:VHN-123428
db:BIDid:108502
db:JVNDBid:JVNDB-2018-015553
db:CNNVDid:CNNVD-201905-1045
db:NVDid:CVE-2018-13375

LAST UPDATE DATE

2024-08-14T15:38:54.040000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-123428date:2019-05-30T00:00:00
db:BIDid:108502date:2018-11-16T00:00:00
db:JVNDBid:JVNDB-2018-015553date:2019-06-12T00:00:00
db:CNNVDid:CNNVD-201905-1045date:2019-05-31T00:00:00
db:NVDid:CVE-2018-13375date:2019-05-30T15:19:19.737

SOURCES RELEASE DATE

db:VULHUBid:VHN-123428date:2019-05-28T00:00:00
db:BIDid:108502date:2018-11-16T00:00:00
db:JVNDBid:JVNDB-2018-015553date:2019-06-12T00:00:00
db:CNNVDid:CNNVD-201905-1045date:2019-05-28T00:00:00
db:NVDid:CVE-2018-13375date:2019-05-28T19:29:00.597