Vulnerability Note VU#667340
Fortinet FortiADC D-series contains a cross-site scripting vulnerability
Original Release date: 11 Apr 2014 | Last revised: 15 Apr 2014

Overview
Fortinet FortiADC D-series 3.2.0, and possibly earlier versions, contains a cross-site scripting vulnerability. (CWE-79)

Description
CWE-79: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’)
Fortinet FortiADC D-series 3.2.0, and possibly earlier versions, contains a cross-site scripting vulnerability. The "locale" parameter in the "/FortiADC/gui_partA/?locale=en" page is vulnerable to a reflected cross-site scripting attack.

Impact
A remote unauthenticated attacker may be able to execute arbitrary script in the context of the end-user’s browser session.

Solution
Apply an Update

FortiADC D-series 3.2.1 has been released to address this vulnerability.
Restrict access

As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user’s host. Restricting access would prevent an attacker from accessing the FortiADC interface using stolen credentials from a blocked network location.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate UpdatedFortinet, Inc.Affected07 Feb 201411 Apr 2014If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
4.3
AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal
3.7
E:POC/RL:W/RC:C

Environmental
2.8
CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

http://www.fortiguard.com/advisory/FG-IR-14-004/
http://cwe.mitre.org/data/definitions/79.html
http://www.fortinet.com/products/fortiadc/index.html
http://seclists.org/fulldisclosure/2014/Apr/53

Credit

Thanks to William Costa for reporting this vulnerability.
This document was written by Jared Allar.

Other Information

CVE IDs:
CVE-2014-0331

Date Public:
11 Apr 2014

Date First Published:
11 Apr 2014

Date Last Updated:
15 Apr 2014

Document Revision:
23

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply