ghsa-5xg4-jxh8-j4g8
Vulnerability from github
Published
2022-05-13 01:43
Modified
2022-05-13 01:43
Severity
Details

An Improper Access Control vulnerability in Fortinet FortiWeb 5.6.0 up to but not including 6.1.0 under "Signed Security Mode", allows attacker to bypass the signed user cookie protection by removing the FortiWeb own protection session cookie.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2017-14191"
  ],
  "database_specific": {
    "cwe_ids": [],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2018-03-20T13:29:00Z",
    "severity": "MODERATE"
  },
  "details": "An Improper Access Control vulnerability in Fortinet FortiWeb 5.6.0 up to but not including 6.1.0 under \"Signed Security Mode\", allows attacker to bypass the signed user cookie protection by removing the FortiWeb own protection session cookie.",
  "id": "GHSA-5xg4-jxh8-j4g8",
  "modified": "2022-05-13T01:43:20Z",
  "published": "2022-05-13T01:43:20Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14191"
    },
    {
      "type": "WEB",
      "url": "https://fortiguard.com/advisory/FG-IR-17-279"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/103430"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...