ID

VAR-202111-0241


CVE

CVE-2021-36172


TITLE

FortiPortal  In  XML  External entity vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2021-014576

DESCRIPTION

An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents. FortiPortal for, XML There is a vulnerability in an external entity.Information is obtained and service operation is interrupted (DoS) It may be in a state. Fortinet FortiPortal is an advanced, feature-rich managed security analysis and management support tool for Fortinet's FortiGate, FortiWiFi and FortiAP product lines, available as a virtual machine for MSPs

Trust: 1.71

sources: NVD: CVE-2021-36172 // JVNDB: JVNDB-2021-014576 // VULHUB: VHN-398012

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiportalscope:lteversion:4.2.4

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:lteversion:5.0.3

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:ltversion:6.0.6

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:lteversion:4.1.2

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:4.0.0

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:4.2.0

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:lteversion:5.2.6

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:lteversion:4.0.4

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:5.2.0

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:lteversion:5.1.2

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:5.3.0

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:ltversion:5.3.7

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:4.1.0

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:5.0.0

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortiportalscope:gteversion:5.1.0

Trust: 1.0

vendor:フォーティネットmodel:fortiportalscope:eqversion:6.0.6

Trust: 0.8

vendor:フォーティネットmodel:fortiportalscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-014576 // NVD: CVE-2021-36172

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-36172
value: HIGH

Trust: 1.0

psirt@fortinet.com: CVE-2021-36172
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-36172
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202111-327
value: HIGH

Trust: 0.6

VULHUB: VHN-398012
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-36172
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-398012
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-36172
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.2
version: 3.1

Trust: 1.0

psirt@fortinet.com: CVE-2021-36172
baseSeverity: MEDIUM
baseScore: 4.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-36172
baseSeverity: HIGH
baseScore: 8.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-398012 // JVNDB: JVNDB-2021-014576 // CNNVD: CNNVD-202111-327 // NVD: CVE-2021-36172 // NVD: CVE-2021-36172

PROBLEMTYPE DATA

problemtype:CWE-611

Trust: 1.1

problemtype:XML Improper restriction of external entity references (CWE-611) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-398012 // JVNDB: JVNDB-2021-014576 // NVD: CVE-2021-36172

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202111-327

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-202111-327

PATCH

title:FG-IR-21-104url:https://www.fortiguard.com/psirt/FG-IR-21-104

Trust: 0.8

title:Fortinet FortiPortal Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=168759

Trust: 0.6

sources: JVNDB: JVNDB-2021-014576 // CNNVD: CNNVD-202111-327

EXTERNAL IDS

db:NVDid:CVE-2021-36172

Trust: 3.3

db:JVNDBid:JVNDB-2021-014576

Trust: 0.8

db:CNNVDid:CNNVD-202111-327

Trust: 0.7

db:AUSCERTid:ESB-2021.3911

Trust: 0.6

db:CS-HELPid:SB2021111611

Trust: 0.6

db:VULHUBid:VHN-398012

Trust: 0.1

sources: VULHUB: VHN-398012 // JVNDB: JVNDB-2021-014576 // CNNVD: CNNVD-202111-327 // NVD: CVE-2021-36172

REFERENCES

url:https://fortiguard.com/advisory/fg-ir-21-104

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-36172

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.3911

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021111611

Trust: 0.6

sources: VULHUB: VHN-398012 // JVNDB: JVNDB-2021-014576 // CNNVD: CNNVD-202111-327 // NVD: CVE-2021-36172

SOURCES

db:VULHUBid:VHN-398012
db:JVNDBid:JVNDB-2021-014576
db:CNNVDid:CNNVD-202111-327
db:NVDid:CVE-2021-36172

LAST UPDATE DATE

2024-08-14T15:22:03.996000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-398012date:2021-11-04T00:00:00
db:JVNDBid:JVNDB-2021-014576date:2022-10-20T08:03:00
db:CNNVDid:CNNVD-202111-327date:2021-11-17T00:00:00
db:NVDid:CVE-2021-36172date:2021-11-04T13:19:23.757

SOURCES RELEASE DATE

db:VULHUBid:VHN-398012date:2021-11-02T00:00:00
db:JVNDBid:JVNDB-2021-014576date:2022-10-20T00:00:00
db:CNNVDid:CNNVD-202111-327date:2021-11-02T00:00:00
db:NVDid:CVE-2021-36172date:2021-11-02T18:15:08.553