{ "id": "CVE-2016-3978", "sourceIdentifier": "cve@mitre.org", "published": "2016-04-08T14:59:07.913", "lastModified": "2016-04-14T14:22:02.307", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the \"redirect\" parameter to \"login.\"" }, { "lang": "es", "value": "La Web User Interface (WebUI) en FortiOS 5.0.x en versiones anteriores a 5.0.13, 5.2.x en versiones anteriores a 5.2.3 y 5.4.x en versiones anteriores a 5.4.0 permite a atacantes remotos redirigir a usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing o ataques de XSS a trav\u00e9s del par\u00e1metro \"redirect\" en \"login\"." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E542BE2-14FC-4BA8-890C-7DA81F33F032" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "0D8A5EC4-CE2C-4174-9F09-361B8D153AD9" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C3BABC91-F9BF-4B52-BDBF-F9617ABCAC9F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9C172379-F6BA-4343-831A-62004E742C6D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "516597D9-086E-4668-A40B-473F38125F92" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "D62F480B-D8CA-4F5C-8034-C0AE73F26B67" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "F435F408-EC5B-42A0-9E3C-4DE5D702ACAE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "823C8357-E638-4EAE-B231-3B60263FFE52" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "1C6615C7-C6F8-4E42-BA09-5A29A0B68E09" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B24C5917-BBC0-4924-9FB0-49E141DC9D54" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "513A1CAA-9B87-4CF5-9513-396E2E686CDF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "62CD94B3-C430-4672-BBEA-B8A542944F66" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "91AA2061-5D28-4DCF-9126-8D5CE57D96F5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E627C59-7C16-44F0-800D-A2E8A766B26D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "233236FA-BB13-4261-BE2E-3E617406DC53" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "27844CC9-498B-4A65-91AC-AC130222EE5F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:fortinet:fortios:5.4:*:*:*:*:*:*:*", "matchCriteriaId": "0E953F20-9598-4074-BC65-2FEA3ED2ECF1" } ] } ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2016/Mar/68", "source": "cve@mitre.org" }, { "url": "http://www.fortiguard.com/advisory/fortios-open-redirect-vulnerability", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securitytracker.com/id/1035332", "source": "cve@mitre.org" } ] }