Fortinet FortiOS 5.x >= 5.4.0 / 6.x < 6.0.9 / 6.2.x < 6.2.2 URL Redirection Vulnerability (FG-IR-19-179)

Medium Nessus Plugin ID 134228

Synopsis

The remote host is affected by a URL redirection vulnerability.

Description

The remote host is running a version of FortiOS 5.x greater than or equal to 5.4.0, 6.x prior to 6.0.9, or 6.2.x prior to 6.2.2. It is, therefore, affected by a URL redirection vulnerability due to an input-validation flaw related to the admin password change page.

Solution

Upgrade to Fortinet FortiOS version to 6.0.9, 6.2.2 or later.

See Also

https://fortiguard.com/psirt/FG-IR-19-179

Plugin Details

Severity: Medium

ID: 134228

File Name: fortios_FG-IR-19-179.nasl

Version: 1.3

Type: local

Family: Firewalls

Published: 2020/03/05

Updated: 2020/03/24

Dependencies: 73522

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2019-6696

CVSS v2.0

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:fortinet:fortios

Required KB Items: Host/Fortigate/model, Host/Fortigate/version, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 2020/02/18

Vulnerability Publication Date: 2020/02/18

Reference Information

CVE: CVE-2019-6696

IAVA: 2020-A-0038