mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
Commit CVE-2018-13379
This commit is contained in:
parent
83662755ef
commit
111296f2e5
@ -15,22 +15,35 @@
|
|||||||
"product": {
|
"product": {
|
||||||
"product_data": [
|
"product_data": [
|
||||||
{
|
{
|
||||||
"product_name": "Fortinet FortiOS",
|
"product_name": "Fortinet FortiOS, FortiProxy",
|
||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_value": "FortiOS 6.0.0 to 6.0.4"
|
"version_value": "FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12, FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
},
|
},
|
||||||
{
|
"impact": {
|
||||||
"version_value": "5.6.3 to 5.6.7"
|
"cvss": {
|
||||||
}
|
"attackComplexity": "Low",
|
||||||
]
|
"attackVector": "Network",
|
||||||
}
|
"availabilityImpact": "High",
|
||||||
}
|
"baseScore": 8.9,
|
||||||
]
|
"baseSeverity": "High",
|
||||||
}
|
"confidentialityImpact": "High",
|
||||||
}
|
"integrityImpact": "None",
|
||||||
]
|
"privilegesRequired": "None",
|
||||||
|
"scope": "Unchanged",
|
||||||
|
"userInteraction": "None",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||||
|
"version": "3.1"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"problemtype": {
|
"problemtype": {
|
||||||
@ -53,34 +66,9 @@
|
|||||||
"url": "https://fortiguard.com/advisory/FG-IR-18-384"
|
"url": "https://fortiguard.com/advisory/FG-IR-18-384"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"refsource": "BID",
|
"refsource": "CONFIRM",
|
||||||
"name": "108693",
|
"name": "https://www.fortiguard.com/psirt/FG-IR-20-233",
|
||||||
"url": "http://www.securityfocus.com/bid/108693"
|
"url": "https://www.fortiguard.com/psirt/FG-IR-20-233"
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://packetstormsecurity.com/files/154146/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html",
|
|
||||||
"url": "http://packetstormsecurity.com/files/154146/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "http://packetstormsecurity.com/files/154147/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html",
|
|
||||||
"url": "http://packetstormsecurity.com/files/154147/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/",
|
|
||||||
"url": "https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf",
|
|
||||||
"url": "https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"refsource": "MISC",
|
|
||||||
"name": "https://github.com/blacklotuslabs/Development/blob/master/Mitigations/CVE/CVE-2018-13379/CVE-2018-13379%20-%20Summary%20%26%20Emergency%20Mitigations.pdf",
|
|
||||||
"url": "https://github.com/blacklotuslabs/Development/blob/master/Mitigations/CVE/CVE-2018-13379/CVE-2018-13379%20-%20Summary%20%26%20Emergency%20Mitigations.pdf"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -88,7 +76,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "An Improper Limitation of a Pathname to a Restricted Directory (\"Path Traversal\") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests."
|
"value": "An Improper Limitation of a Pathname to a Restricted Directory (\"Path Traversal\") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user