var-201502-0399
Vulnerability from variot

Fortinet FortiAuthenticator 3.0.0 logs the PostgreSQL usernames and passwords in cleartext, which allows remote administrators to obtain sensitive information by reading the log at debug/startup/. Fortinet FortiAuthenticator Appliance is prone to the following multiple security vulnerabilities: 1. A cross-site scripting vulnerability 2. A command-execution vulnerability 3. Multiple information-disclosure vulnerabilities An attacker can exploit these issues to execute arbitrary script code in the context of the vulnerable site, potentially allowing the attacker to steal cookie-based authentication credentials, execute arbitrary commands and gain access to potentially sensitive information. FortiAuthenticator v300 build 0007 is vulnerable; other versions may also be affected. Fortinet FortiAuthenticator is a series of security authentication software from Fortinet, which can be combined with FortiToken (two-factor authentication token) to provide secure two-factor authentication to third-party devices authenticated by RADIUS or LDAP. The vulnerability stems from the fact that the program records PostgreSQL username and password in plain text. ( , ) (, . '.' ) ('. ', ). , ('. ( ) ( (,) .'), ) _ , / _/ / _ \ ____ _____ ____ \==/ /\ \ _/ \/ _ \ / \ / \/ | \ _( <> ) Y Y \ /__ /_| / _ >_/||| / \/ \/.-. \/ \/:wq (x.0) '=.|w|.=' _=''"''=.

            presents.. The FortiAuthenticator is a user

identity management appliance, supporting two factor authentication, RADIUS, LDAP, 802.1x Wireless Authentication, Certificate management and single sign on.

The FortiAuthenticator appliance was found to contain a subshell bypass vulnerability, allowing remote administrators to gain root level access via the command line. Local file and password disclosure vulnerabilities were discovered, as well as a Reflected Cross Site Scripting vulnerability within the SCEP system.

+--------------+ | Exploitation | +--------------+ --[ dbgcore_enable_shell_access Subshell Bypass

By logging into the Fortinet Authenticator and executing the ‘shell’ command, a malicious user can gain a root /bin/bash shell on the server. However, unless the /tmp/privexec/dbgcore_enable_shell_access file exists (the contents of this file are irrelevant), then the command returns ‘shell: No such command.' If the file is present, then the command succeeds and a root shell is given.

The ‘/tmp/privexec/dbgcore_enable_shell_access’ file can be created by using the ‘load-debug-kit’ command and specifying a network accessible tftp server with the relevant debug kit. The debug kits were found to be generated by an internal Fortinet tool called ‘mkprivexec’. The ‘load-debug-kit’ command expects encrypted binaries which are subsequently executed.

An attacker that can either generate a valid debug kit or create the appropriate file in /tmp/privexec can therefore get a root shell. This is likely a workaround for CVE-2013-6990, however an attacker can still obtain root level command line access with some additional steps.

--[ Local File Disclosure

A malicious user can pass the ‘-f’ flag to the ‘dig’ command and read files from the filesystem. An example would be executing 'dig -f /etc/passwd' and observing the dig commands output, retrieving the /etc/passwd files contents.

--[ Password Disclosure

A malicious user may use the debug logging functionality within the Fortinet FortiAuthenticator administrative console to obtain the passwords of the PostgreSQL database users. The disclosed passwords were found to be weak and are static across Fortinet FortiAuthenticator appliances. The following credentials were enumerated:

+-----------------+ |Username:Password| +-----------------+ | slony : slony | |www-data:www-data| +-----------------+

--[ Reflected Cross Site Scripting

By coercing a legitimate user (usually through a social engineering attack) to visit a specific FortiAuthenticator URL, an attacker may execute malicious JavaScript in the context of the user’s browser. This can subsequently be used to harm the user’s browser or hijack their session. This is due to the ‘operation’ parameter in the SCEP service being reflected to the end user without sufficient input validation and output scrubbing. The following URL can be used to replicate the Reflected Cross Site Scripting vulnerability:

https:///cert/scep/?operation=

+----------+ | Solution | +----------+ No official solution is currently available for these vulnerabilities. Email correspondence with Fortinet suggests that the Local File Disclosure and Password Disclosure vulnerabilities have been resolved in version 3.2. No official documentation was found to confirm this.

+---------------------+ | Disclosure Timeline | +---------------------+ 08/10/2014 - Initial email sent to Fortinet PSIRT team. 09/10/2014 - Advisory documents sent to Fortinet. 15/10/2014 - Acknowledgement of advisories from Fortinet. 16/10/2014 - Fortinet advised the Local File and Password disclosure issues would be resolved in the 3.2 release. 31/10/2014 - Additional information sent to Fortinet RE Reflected XSS 03/11/2014 - Additional information sent to Fortinet RE Reflected XSS 02/12/2014 - Update requested from Fortinet. 13/12/2014 - Update requested from Fortinet. 29/01/2015 - Advisory Release.

+-------------------------------+ | About Security-Assessment.com | +-------------------------------+

Security-Assessment.com is Australasia's leading team of Information Security consultants specialising in providing high quality Information Security services to clients throughout the Asia Pacific region. Our clients include some of the largest globally recognised companies in areas such as finance, telecommunications, broadcasting, legal and government. Our aim is to provide the very best independent advice and a high level of technical expertise while creating long and lasting professional relationships with our clients.

Security-Assessment.com is committed to security research and development, and its team continues to identify and responsibly publish vulnerabilities in public and private software vendor's products. Members of the Security-Assessment.com R&D team are globally recognised through their release of whitepapers and presentations related to new security research.

For further information on this issue or any of our service offerings, contact us:

Web www.security-assessment.com Email info () security-assessment com Phone +64 4 470 1650

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0399",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "fortiauthenticator",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "fortinet",
        "version": "3.0.0"
      },
      {
        "model": "fortiauthenticator",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "fortinet",
        "version": "3.2.1"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:fortinet:fortiauthenticator:3.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Denis Andzakovic",
    "sources": [
      {
        "db": "BID",
        "id": "72378"
      },
      {
        "db": "PACKETSTORM",
        "id": "130156"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2015-1456",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2015-1456",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.0,
            "id": "VHN-79417",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2015-1456",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201502-060",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-79417",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2015-1456",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1456"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Fortinet FortiAuthenticator 3.0.0 logs the PostgreSQL usernames and passwords in cleartext, which allows remote administrators to obtain sensitive information by reading the log at debug/startup/. Fortinet FortiAuthenticator Appliance is prone to the following multiple security vulnerabilities:\n1. A cross-site scripting vulnerability\n2. A command-execution vulnerability\n3. Multiple information-disclosure vulnerabilities\nAn attacker can exploit these issues to execute arbitrary script code in  the context of the vulnerable site, potentially allowing the attacker  to steal cookie-based authentication credentials, execute arbitrary commands and gain access to potentially sensitive information. \nFortiAuthenticator v300 build 0007 is vulnerable; other versions may also be affected. Fortinet FortiAuthenticator is a series of security authentication software from Fortinet, which can be combined with FortiToken (two-factor authentication token) to provide secure two-factor authentication to third-party devices authenticated by RADIUS or LDAP. The vulnerability stems from the fact that the program records PostgreSQL username and password in plain text. (    , )     (,\n  .   \u0027.\u0027 ) (\u0027.    \u0027,\n   ). , (\u0027.   ( ) (\n  (_,) .\u0027), ) _ _,\n /  _____/  / _  \\    ____  ____   _____\n \\____  \\==/ /_\\  \\ _/ ___\\/  _ \\ /     \\\n /       \\/   |    \\\\  \\__(  \u003c_\u003e )  Y Y  \\\n/______  /\\___|__  / \\___  \u003e____/|__|_|  /\n        \\/         \\/.-.    \\/         \\/:wq\n                    (x.0)\n                  \u0027=.|w|.=\u0027\n                  _=\u0027\u0027\"\u0027\u0027=. \n\n                presents.. The FortiAuthenticator is a user\nidentity management appliance, supporting two factor authentication, RADIUS,\nLDAP, 802.1x Wireless Authentication, Certificate management and single sign\non. \n\nThe FortiAuthenticator appliance was found to contain a subshell bypass\nvulnerability, allowing remote administrators to gain root level access via\nthe command line. Local file and password disclosure vulnerabilities were\ndiscovered, as well as a Reflected Cross Site Scripting vulnerability within\nthe SCEP system. \n\n+--------------+\n| Exploitation |\n+--------------+\n--[ dbgcore_enable_shell_access Subshell Bypass\n\nBy logging into the Fortinet Authenticator and executing the \u2018shell\u2019 command,\na malicious user can gain a root /bin/bash shell on the server. However,\nunless the /tmp/privexec/dbgcore_enable_shell_access file exists (the contents\nof this file are irrelevant), then the command returns \u2018shell: No such\ncommand.\u0027  If the file is present, then the command succeeds and a root shell\nis given. \n \nThe \u2018/tmp/privexec/dbgcore_enable_shell_access\u2019 file can be created by using\nthe \u2018load-debug-kit\u2019 command and specifying a network accessible tftp server\nwith the relevant debug kit. The debug kits were found to be generated by an\ninternal Fortinet tool called \u2018mkprivexec\u2019. The \u2018load-debug-kit\u2019 command\nexpects encrypted binaries which are subsequently executed. \n\nAn attacker that can either generate a valid debug kit or create the\nappropriate file in /tmp/privexec can therefore get a root shell. This is\nlikely a workaround for CVE-2013-6990, however an attacker can still obtain\nroot level command line access with some additional steps. \n\n--[ Local File Disclosure\n\nA malicious user can pass the \u2018-f\u2019 flag to the \u2018dig\u2019 command and read files\nfrom the filesystem. An example would be executing \u0027dig -f /etc/passwd\u0027 and\nobserving the dig commands output, retrieving the /etc/passwd files contents. \n \n--[ Password Disclosure\n\nA malicious user may use the debug logging functionality within the Fortinet\nFortiAuthenticator administrative console to obtain the passwords of the\nPostgreSQL database users. The disclosed passwords were found to be weak and\nare static across Fortinet FortiAuthenticator appliances. The following\ncredentials were enumerated:\n\n+-----------------+\n|Username:Password|\n+-----------------+\n|  slony : slony  |\n|www-data:www-data|\n+-----------------+\n \n--[ Reflected Cross Site Scripting\n\nBy coercing a legitimate user (usually through a social engineering attack) to\nvisit a specific FortiAuthenticator URL, an attacker may execute malicious\nJavaScript in the context of the user\u2019s browser. This can subsequently be used\nto harm the user\u2019s browser or hijack their session. This is due to the\n\u2018operation\u2019 parameter in the SCEP service being reflected to the end user\nwithout sufficient input validation and output scrubbing. The following\nURL can be used to replicate the Reflected Cross Site Scripting vulnerability:\n\nhttps://\u003cFortiAuthenticatorIP\u003e/cert/scep/?operation=\u003cscript\u003ealert(1)\u003c/script\u003e\n\n+----------+\n| Solution |\n+----------+\nNo official solution is currently available for these vulnerabilities. Email\ncorrespondence with Fortinet suggests that the Local File Disclosure and\nPassword Disclosure vulnerabilities have been resolved in version 3.2. No\nofficial documentation was found to confirm this. \n\n+---------------------+\n| Disclosure Timeline |\n+---------------------+\n08/10/2014 -\tInitial email sent to Fortinet PSIRT team. \n09/10/2014 -\tAdvisory documents sent to Fortinet. \n15/10/2014 -\tAcknowledgement of advisories from Fortinet. \n16/10/2014 -\tFortinet advised the Local File and Password disclosure issues would be resolved in the 3.2 release. \n31/10/2014 -\tAdditional information sent to Fortinet RE Reflected XSS\n03/11/2014 -\tAdditional information sent to Fortinet RE Reflected XSS\n02/12/2014 -\tUpdate requested from Fortinet. \n13/12/2014 -\tUpdate requested from Fortinet. \n29/01/2015 -\tAdvisory Release. \n\n+-------------------------------+\n| About Security-Assessment.com |\n+-------------------------------+\n\nSecurity-Assessment.com is Australasia\u0027s leading team of Information Security\nconsultants specialising in providing high quality Information Security \nservices to clients throughout the Asia Pacific region. Our clients include\nsome of the largest globally recognised companies in areas such as finance,\ntelecommunications, broadcasting, legal and government. Our aim is to provide\nthe very best independent advice and a high level of technical expertise while\ncreating long and lasting professional relationships with our clients. \n\nSecurity-Assessment.com is committed to security research and development,\nand its team continues to identify and responsibly publish vulnerabilities\nin public and private software vendor\u0027s products. Members of the \nSecurity-Assessment.com R\u0026D team are globally recognised through their release\nof whitepapers and presentations related to new security research. \n\nFor further information on this issue or any of our service offerings, \ncontact us:\n\nWeb www.security-assessment.com\nEmail info () security-assessment com\nPhone +64 4 470 1650\n\n\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "db": "BID",
        "id": "72378"
      },
      {
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1456"
      },
      {
        "db": "PACKETSTORM",
        "id": "130156"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-1456",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "72378",
        "trust": 2.1
      },
      {
        "db": "PACKETSTORM",
        "id": "130156",
        "trust": 1.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-79417",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1456",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1456"
      },
      {
        "db": "BID",
        "id": "72378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "db": "PACKETSTORM",
        "id": "130156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "id": "VAR-201502-0399",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79417"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-02-13T22:46:35.853000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "FortiAuthenticator multiple vulnerabilities",
        "trust": 0.8,
        "url": "http://www.fortiguard.com/advisory/fg-ir-15-003/"
      },
      {
        "title": "FortiAuthenticator\u8a8d\u8a3c\u30b5\u30fc\u30d0\u30fc",
        "trust": 0.8,
        "url": "http://www.fortinet.co.jp/products/fortiauthenticator/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-200",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.7,
        "url": "http://www.security-assessment.com/files/documents/advisory/fortinet_fortiauthenticator_multiple_vulnerabilities.pdf"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/72378"
      },
      {
        "trust": 1.8,
        "url": "http://packetstormsecurity.com/files/130156/fortinet-fortiauthenticator-xss-disclosure-bypass.html"
      },
      {
        "trust": 1.2,
        "url": "http://www.fortiguard.com/advisory/fg-ir-15-003/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-1456"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-1456"
      },
      {
        "trust": 0.3,
        "url": "http://www.fortinet.com/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/200.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://\u003cfortiauthenticatorip\u003e/cert/scep/?operation=\u003cscript\u003ealert(1)\u003c/script\u003e"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1456"
      },
      {
        "db": "BID",
        "id": "72378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "db": "PACKETSTORM",
        "id": "130156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "db": "VULMON",
        "id": "CVE-2015-1456"
      },
      {
        "db": "BID",
        "id": "72378"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "db": "PACKETSTORM",
        "id": "130156"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-02-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "date": "2015-02-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-1456"
      },
      {
        "date": "2015-01-29T00:00:00",
        "db": "BID",
        "id": "72378"
      },
      {
        "date": "2015-02-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "date": "2015-01-29T16:15:59",
        "db": "PACKETSTORM",
        "id": "130156"
      },
      {
        "date": "2015-02-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      },
      {
        "date": "2015-02-03T16:59:28.437000",
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-02-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-79417"
      },
      {
        "date": "2015-02-19T00:00:00",
        "db": "VULMON",
        "id": "CVE-2015-1456"
      },
      {
        "date": "2015-03-19T07:30:00",
        "db": "BID",
        "id": "72378"
      },
      {
        "date": "2015-03-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      },
      {
        "date": "2015-02-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      },
      {
        "date": "2015-02-19T18:59:40.657000",
        "db": "NVD",
        "id": "CVE-2015-1456"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Fortinet FortiAuthenticator Vulnerability where important information is obtained",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-001439"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "information disclosure",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-060"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.