ID

VAR-202009-0093


CVE

CVE-2020-12811


TITLE

FortiManager and FortiAnalyzer Cross-site scripting vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202009-1256

DESCRIPTION

An improper neutralization of script-related HTML tags in a web page in FortiManager 6.2.0, 6.2.1, 6.2.2, and 6.2.3and FortiAnalyzer 6.2.0, 6.2.1, 6.2.2, and 6.2.3 may allow an attacker to execute a cross site scripting (XSS) via the Identify Provider name field. Both Fortinet FortiManager and Fortinet FortiAnalyzer are products of Fortinet. Fortinet FortiManager is a centralized network security management platform. The platform supports centralized management of any number of Fortinet devices, and can group devices into different management domains (ADOMs) to further simplify multi-device security deployment and management. Fortinet FortiAnalyzer is a centralized network security reporting solution. This product is mainly used to collect network log data, and analyze, report, and archive the security events, network traffic, and Web content in the logs through the report suite. FortiManager and FortiAnalyzer have a cross-site scripting vulnerability, which stems from the lack of proper validation of client-side data in WEB applications. An attacker could exploit this vulnerability to execute client code

Trust: 0.99

sources: NVD: CVE-2020-12811 // VULHUB: VHN-165527

AFFECTED PRODUCTS

vendor:fortinetmodel:fortianalyzerscope:lteversion:6.2.6

Trust: 1.0

vendor:fortinetmodel:fortianalyzerscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:lteversion:6.2.6

Trust: 1.0

vendor:fortinetmodel:fortimanagerscope:gteversion:6.2.0

Trust: 1.0

sources: NVD: CVE-2020-12811

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-12811
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202009-1256
value: MEDIUM

Trust: 0.6

VULHUB: VHN-165527
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-12811
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-165527
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-12811
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-165527 // CNNVD: CNNVD-202009-1256 // NVD: CVE-2020-12811

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.1

sources: VULHUB: VHN-165527 // NVD: CVE-2020-12811

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202009-1256

TYPE

XSS

Trust: 0.6

sources: CNNVD: CNNVD-202009-1256

PATCH

title:FortiManager and FortiAnalyzer Fixes for cross-site scripting vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=129276

Trust: 0.6

sources: CNNVD: CNNVD-202009-1256

EXTERNAL IDS

db:NVDid:CVE-2020-12811

Trust: 1.7

db:CNNVDid:CNNVD-202009-1256

Trust: 0.7

db:AUSCERTid:ESB-2020.3210

Trust: 0.6

db:VULHUBid:VHN-165527

Trust: 0.1

sources: VULHUB: VHN-165527 // CNNVD: CNNVD-202009-1256 // NVD: CVE-2020-12811

REFERENCES

url:https://fortiguard.com/advisory/fg-ir-20-005

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-12811

Trust: 0.6

url:https://vigilance.fr/vulnerability/fortimanager-fortianalyzer-cross-site-scripting-via-identify-provider-name-33367

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.3210/

Trust: 0.6

sources: VULHUB: VHN-165527 // CNNVD: CNNVD-202009-1256 // NVD: CVE-2020-12811

SOURCES

db:VULHUBid:VHN-165527
db:CNNVDid:CNNVD-202009-1256
db:NVDid:CVE-2020-12811

LAST UPDATE DATE

2024-08-14T14:03:35.516000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-165527date:2020-09-30T00:00:00
db:CNNVDid:CNNVD-202009-1256date:2020-10-09T00:00:00
db:NVDid:CVE-2020-12811date:2020-09-30T19:18:09.800

SOURCES RELEASE DATE

db:VULHUBid:VHN-165527date:2020-09-24T00:00:00
db:CNNVDid:CNNVD-202009-1256date:2020-09-18T00:00:00
db:NVDid:CVE-2020-12811date:2020-09-24T18:15:16.887