mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
68 lines
2.1 KiB
JSON
68 lines
2.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "psirt@fortinet.com",
|
|
"DATE_PUBLIC": "2018-03-06T00:00:00",
|
|
"ID": "CVE-2017-14191",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "FortiWeb",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "5.6.0 and above"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Fortinet, Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An Improper Access Control vulnerability in Fortinet FortiWeb 5.6.0 up to but not including 6.1.0 under \"Signed Security Mode\", allows attacker to bypass the signed user cookie protection by removing the FortiWeb own protection session cookie."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Improper Access Control"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "103430",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/103430"
|
|
},
|
|
{
|
|
"name": "https://fortiguard.com/advisory/FG-IR-17-279",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://fortiguard.com/advisory/FG-IR-17-279"
|
|
}
|
|
]
|
|
}
|
|
} |