Fortinet FortiAnalyzer 5.0.x < 5.0.3 LDAP Authentication Bypass

critical Nessus Plugin ID 84919

Synopsis

The remote host is potentially affected by an authentication bypass vulnerability.

Description

The version of Fortinet FortiAnalyzer running on the remote host is 5.0.x prior to 5.0.3. It is, therefore, potentially affected by an authentication bypass vulnerability that allows an LDAP user to authenticate without entering a password when LDAP is configured and enabled.

Note that Nessus has not tested for this issue or the host configuration but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Fortinet FortiAnalyzer 5.0.3 or later.

See Also

http://www.nessus.org/u?999bb365

Plugin Details

Severity: Critical

ID: 84919

File Name: fortianalyzer_5_0_3.nasl

Version: 1.6

Type: local

Family: CGI abuses

Published: 7/22/2015

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:fortinet:fortianalyzer_firmware

Required KB Items: Settings/ParanoidReport, Host/Fortigate/model, Host/Fortigate/version

Patch Publication Date: 10/5/2013

Vulnerability Publication Date: 10/5/2013