Fortinet FortiOS 5.x >= 5.4.0 / 6.x < 6.0.9 / 6.2.x < 6.2.2 URL Redirection Vulnerability (FG-IR-19-179)

medium Nessus Plugin ID 134228

Synopsis

The remote host is affected by a URL redirection vulnerability.

Description

The remote host is running a version of FortiOS 5.x greater than or equal to 5.4.0, 6.x prior to 6.0.9, or 6.2.x prior to 6.2.2. It is, therefore, affected by a URL redirection vulnerability due to an input-validation flaw related to the admin password change page.

Solution

Upgrade to Fortinet FortiOS version to 6.0.9, 6.2.2 or later.

See Also

https://fortiguard.com/psirt/FG-IR-19-179

Plugin Details

Severity: Medium

ID: 134228

File Name: fortios_FG-IR-19-179.nasl

Version: 1.6

Type: local

Family: Firewalls

Published: 3/5/2020

Updated: 9/16/2022

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2019-6696

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:fortinet:fortios

Required KB Items: Settings/ParanoidReport, Host/Fortigate/model, Host/Fortigate/version

Exploit Ease: No known exploits are available

Patch Publication Date: 2/18/2020

Vulnerability Publication Date: 2/18/2020

Reference Information

CVE: CVE-2019-6696

IAVA: 2020-A-0038-S