ID

VAR-202002-0833


CVE

CVE-2015-3611


TITLE

FortiManager  In  OS  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2015-008559

DESCRIPTION

A Command Injection vulnerability exists in FortiManager 5.2.1 and earlier and FortiManager 5.0.10 and earlier via unspecified vectors, which could let a malicious user run systems commands when executing a report. FortiManager In OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. FortiManager is prone to following security vulnerabilities: 1. A remote privilege-escalation vulnerability 2. An HTML-injection vulnerability 3. An SQL-injection vulnerability 4. A local privilege-escalation vulnerability 5. An arbitrary file-download vulnerability Exploiting these issues could allow an attacker to execute attacker-supplied HTML or script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, compromise the application, access or modify data, exploit latent vulnerabilities in the underlying database, gain elevated privileges, or download arbitrary files from the web server and obtain potentially sensitive information. This may aid in other attacks. Fortinet FortiManager is a centralized network security management platform developed by Fortinet. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management. Attackers can exploit this vulnerability to execute system commands

Trust: 1.98

sources: NVD: CVE-2015-3611 // JVNDB: JVNDB-2015-008559 // BID: 74444 // VULHUB: VHN-81572

AFFECTED PRODUCTS

vendor:fortinetmodel:fortimanagerscope:lteversion:5.2.1

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:5.2.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:5.0.10

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:5.0.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.1

Trust: 0.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.10

Trust: 0.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.9

Trust: 0.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.8

Trust: 0.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.4

Trust: 0.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.3

Trust: 0.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.2

Trust: 0.9

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.1

Trust: 0.9

vendor:フォーティネットmodel:fortimanagerscope:eqversion: -

Trust: 0.8

vendor:フォーティネットmodel:fortimanagerscope:lteversion:fortimanager firmware 5.2.1

Trust: 0.8

vendor:フォーティネットmodel:fortimanagerscope:lteversion:fortimanager firmware 5.0.10

Trust: 0.8

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.0

Trust: 0.6

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2.0

Trust: 0.6

vendor:fortinetmodel:fortimanagerscope:eqversion:5.2

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.7

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.6

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0.5

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:eqversion:5.0

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:neversion:5.2.2

Trust: 0.3

vendor:fortinetmodel:fortimanagerscope:neversion:5.0.11

Trust: 0.3

sources: BID: 74444 // JVNDB: JVNDB-2015-008559 // CNNVD: CNNVD-202002-052 // NVD: CVE-2015-3611

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-3611
value: HIGH

Trust: 1.0

NVD: CVE-2015-3611
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202002-052
value: HIGH

Trust: 0.6

VULHUB: VHN-81572
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-3611
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-81572
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2015-3611
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2015-3611
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-81572 // JVNDB: JVNDB-2015-008559 // CNNVD: CNNVD-202002-052 // NVD: CVE-2015-3611

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.1

problemtype:OS Command injection (CWE-78) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-81572 // JVNDB: JVNDB-2015-008559 // NVD: CVE-2015-3611

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202002-052

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-202002-052

PATCH

title:Multiple Vulnerabilities in FortiManagerurl:https://fortiguard.com/psirt/FG-IR-15-011

Trust: 0.8

title:Fortinet FortiManager Fixes for operating system command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=109811

Trust: 0.6

sources: JVNDB: JVNDB-2015-008559 // CNNVD: CNNVD-202002-052

EXTERNAL IDS

db:NVDid:CVE-2015-3611

Trust: 2.8

db:BIDid:74444

Trust: 2.0

db:SECTRACKid:1032188

Trust: 1.7

db:JVNDBid:JVNDB-2015-008559

Trust: 0.8

db:CNNVDid:CNNVD-202002-052

Trust: 0.7

db:CNVDid:CNVD-2020-07200

Trust: 0.1

db:VULHUBid:VHN-81572

Trust: 0.1

sources: VULHUB: VHN-81572 // BID: 74444 // JVNDB: JVNDB-2015-008559 // CNNVD: CNNVD-202002-052 // NVD: CVE-2015-3611

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-15-011

Trust: 2.0

url:http://www.securityfocus.com/bid/74444

Trust: 1.7

url:http://www.securitytracker.com/id/1032188

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2015-3611

Trust: 1.4

url:http://www.fortinet.com/products/fortimanager/

Trust: 0.3

url:http://www.fortiguard.com/advisory/fg-ir-15-011/

Trust: 0.3

sources: VULHUB: VHN-81572 // BID: 74444 // JVNDB: JVNDB-2015-008559 // CNNVD: CNNVD-202002-052 // NVD: CVE-2015-3611

CREDITS

Maksymilian Motyl and the ITN Security Team at Orange Polska

Trust: 0.3

sources: BID: 74444

SOURCES

db:VULHUBid:VHN-81572
db:BIDid:74444
db:JVNDBid:JVNDB-2015-008559
db:CNNVDid:CNNVD-202002-052
db:NVDid:CVE-2015-3611

LAST UPDATE DATE

2024-08-14T14:11:58.353000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-81572date:2020-02-05T00:00:00
db:BIDid:74444date:2017-08-25T07:11:00
db:JVNDBid:JVNDB-2015-008559date:2020-02-14T00:00:00
db:CNNVDid:CNNVD-202002-052date:2020-03-02T00:00:00
db:NVDid:CVE-2015-3611date:2020-02-05T21:44:43.560

SOURCES RELEASE DATE

db:VULHUBid:VHN-81572date:2020-02-04T00:00:00
db:BIDid:74444date:2015-04-16T00:00:00
db:JVNDBid:JVNDB-2015-008559date:2020-02-14T00:00:00
db:CNNVDid:CNNVD-202002-052date:2020-02-04T00:00:00
db:NVDid:CVE-2015-3611date:2020-02-04T20:15:11.340