FKIE_CVE-2023-27998
Vulnerability from fkie_nvd - Published: 2023-09-13 13:15 - Updated: 2024-11-21 07:53
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
A lack of custom error pages vulnerability [CWE-756] in FortiPresence versions 1.2.0 through 1.2.1 and all versions of 1.1 and 1.0 may allow an unauthenticated attacker with the ability to navigate to the login GUI to gain sensitive information via navigating to specific HTTP(s) paths.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-288 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-22-288 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fortinet | fortipresence | 1.0.0 | |
| fortinet | fortipresence | 1.1.0 | |
| fortinet | fortipresence | 1.1.1 | |
| fortinet | fortipresence | 1.2.0 | |
| fortinet | fortipresence | 1.2.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortipresence:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "889484EB-8EDC-4FB5-A0F9-1E719C9099D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortipresence:1.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DF2B518A-EA40-4D65-9E9A-69D39A8AC01F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortipresence:1.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C2BEFF20-BAFA-4169-8F6A-D472C45EB2EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortipresence:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "14BC839F-E70C-4676-B523-BAD563C8E6E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortipresence:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E5C2455-84E1-4403-A4B5-B57CDA302BBD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A lack of custom error pages vulnerability [CWE-756] in FortiPresence versions 1.2.0 through 1.2.1 and all versions of 1.1 and 1.0 may allow an unauthenticated attacker with the ability to navigate to the login GUI to gain sensitive information via navigating to specific HTTP(s) paths."
},
{
"lang": "es",
"value": "Una vulnerabilidad de falta de p\u00e1ginas de error personalizadas [CWE-756] en las versiones 1.2.0 a 1.2.1 de FortiPresence y todas las versiones 1.1 y 1.0 puede permitir que un atacante no autenticado con la capacidad de navegar hasta la GUI de inicio de sesi\u00f3n obtenga informaci\u00f3n sensible navegando a rutas HTTP(s) espec\u00edficas."
}
],
"id": "CVE-2023-27998",
"lastModified": "2024-11-21T07:53:54.130",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "psirt@fortinet.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-09-13T13:15:08.200",
"references": [
{
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
],
"url": "https://fortiguard.com/psirt/FG-IR-22-288"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://fortiguard.com/psirt/FG-IR-22-288"
}
],
"sourceIdentifier": "psirt@fortinet.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-756"
}
],
"source": "psirt@fortinet.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-755"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…