var-201311-0370
Vulnerability from variot
cgi-bin/module//sysmanager/admin/SYSAdminUserDialog in Fortinet FortiAnalyzer before 5.0.5 does not properly validate the csrf_token parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks. Exploiting this issue may allow a remote attacker to perform certain unauthorized administrative actions in the context of the device running the affected application. Other attacks are also possible. Versions prior to Fortianalyzer 4.3.7 and 5.0.5 are vulnerable. Fortinet FortiAnalyzer is a centralized network security reporting solution from Fortinet. This solution is mainly used to collect network log data, and analyze, report, and archive the security events, network traffic, and Web content in the logs through the report suite. The vulnerability is caused by the program not filtering the 'csrf_token' parameter correctly
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201311-0370", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortianalyzer", "scope": "lte", "trust": 1.0, "vendor": "fortinet", "version": "5.0.4" }, { "model": "fortianalyzer-300d", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-4000b", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-1000d", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-200d", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-3000d", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-2000b", "scope": "eq", "trust": 1.0, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer", "scope": "lt", "trust": 0.8, "vendor": "fortinet", "version": "5.0.5" }, { "model": "fortianalyzer-1000d", "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-2000b", "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-200d", "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-3000d", "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-300d", "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer-4000b", "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": "fortianalyzer", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.0.4" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "db": "NVD", "id": "CVE-2013-6826" }, { "db": "CNNVD", "id": "CNNVD-201311-181" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fortinet:fortianalyzer_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.0.4", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:fortinet:fortianalyzer-2000b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:fortinet:fortianalyzer-200d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:fortinet:fortianalyzer-4000b:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:fortinet:fortianalyzer-3000d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:fortinet:fortianalyzer-1000d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:fortinet:fortianalyzer-300d:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-6826" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "William Costa", "sources": [ { "db": "BID", "id": "63663" }, { "db": "CNNVD", "id": "CNNVD-201311-181" } ], "trust": 0.9 }, "cve": "CVE-2013-6826", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2013-6826", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-66828", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-6826", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201311-181", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-66828", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-66828" }, { "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "db": "NVD", "id": "CVE-2013-6826" }, { "db": "CNNVD", "id": "CNNVD-201311-181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cgi-bin/module//sysmanager/admin/SYSAdminUserDialog in Fortinet FortiAnalyzer before 5.0.5 does not properly validate the csrf_token parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks. \nExploiting this issue may allow a remote attacker to perform certain unauthorized administrative actions in the context of the device running the affected application. Other attacks are also possible. \nVersions prior to Fortianalyzer 4.3.7 and 5.0.5 are vulnerable. Fortinet FortiAnalyzer is a centralized network security reporting solution from Fortinet. This solution is mainly used to collect network log data, and analyze, report, and archive the security events, network traffic, and Web content in the logs through the report suite. The vulnerability is caused by the program not filtering the \u0027csrf_token\u0027 parameter correctly", "sources": [ { "db": "NVD", "id": "CVE-2013-6826" }, { "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "db": "BID", "id": "63663" }, { "db": "VULHUB", "id": "VHN-66828" } ], "trust": 1.98 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-66828", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-66828" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-6826", "trust": 2.8 }, { "db": "PACKETSTORM", "id": "123980", "trust": 2.5 }, { "db": "BID", "id": "63663", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2013-005213", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201311-181", "trust": 0.7 }, { "db": "EXPLOIT-DB", "id": "38824", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-66828", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-66828" }, { "db": "BID", "id": "63663" }, { "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "db": "NVD", "id": "CVE-2013-6826" }, { "db": "CNNVD", "id": "CNNVD-201311-181" } ] }, "id": "VAR-201311-0370", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-66828" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:44:31.577000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FortiAnalyzer", "trust": 0.8, "url": "http://www.fortinet.co.jp/doc/fortianalyzer_ds.pdf" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005213" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-352", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-66828" }, { "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "db": "NVD", "id": "CVE-2013-6826" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/123980/fortianalyzer-xsrf.txt" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/63663" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6826" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6826" } ], "sources": [ { "db": "VULHUB", "id": "VHN-66828" }, { "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "db": "NVD", "id": "CVE-2013-6826" }, { "db": "CNNVD", "id": "CNNVD-201311-181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-66828" }, { "db": "BID", "id": "63663" }, { "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "db": "NVD", "id": "CVE-2013-6826" }, { "db": "CNNVD", "id": "CNNVD-201311-181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-11-20T00:00:00", "db": "VULHUB", "id": "VHN-66828" }, { "date": "2013-11-12T00:00:00", "db": "BID", "id": "63663" }, { "date": "2013-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "date": "2013-11-20T14:12:31.070000", "db": "NVD", "id": "CVE-2013-6826" }, { "date": "2013-11-14T00:00:00", "db": "CNNVD", "id": "CNNVD-201311-181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-11-20T00:00:00", "db": "VULHUB", "id": "VHN-66828" }, { "date": "2013-11-27T00:25:00", "db": "BID", "id": "63663" }, { "date": "2013-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005213" }, { "date": "2013-11-20T17:10:44.207000", "db": "NVD", "id": "CVE-2013-6826" }, { "date": "2013-11-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201311-181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201311-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fortinet FortiAnalyzer Vulnerable to cross-site request forgery attacks", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005213" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cross-site request forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-201311-181" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.