Vulnerability Note VU#902790
Fortinet Fortiweb 5.1 contains a cross-site request forgery vulnerability
Original Release date: 07 May 2014 | Last revised: 07 May 2014

Overview
Fortinet Fortiweb prior to version 5.2.0 do not sufficiently verify whether a valid request was intentionally provided by the user, which results in a cross-site request forgery (CSRF) vulnerability. (CWE-352)

Description
CWE-352: Cross-Site Request Forgery (CSRF)
Fortinet Fortiweb prior to version 5.2.0 do not sufficiently verify whether a valid request was intentionally provided by the user. The cross-site request forgery (CSRF) vulnerability lies in /system/config/adminadd.

Impact
A remote unauthenticated attacker may be able to trick an authenticated user into making an unintentional request to the web server via a URL, image load, XMLHttpRequest, etc, which will be treated as an authentic request and may result in information leakage or code execution.

Solution
Apply an Update

Fortiweb 5.2.0 has been released to address several CSRF vulnerabilities including this one.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate UpdatedFortinet, Inc.Affected20 Nov 201306 Dec 2013If you are a vendor and your product is affected, let
us know.

CVSS Metrics (Learn More)

Group
Score
Vector

Base
5.8
AV:N/AC:M/Au:N/C:P/I:P/A:N

Temporal
4.5
E:POC/RL:OF/RC:C

Environmental
1.3
CDP:L/TD:L/CR:M/IR:M/AR:L

References

http://www.fortiguard.com/advisory/FG-IR-14-013/
http://cwe.mitre.org/data/definitions/352.html
http://www.fortinet.com/products/fortiweb/

Credit

Thanks to William Costa for reporting this vulnerability.
This document was written by Jared Allar.

Other Information

CVE IDs:
CVE-2014-3115

Date Public:
02 May 2014

Date First Published:
07 May 2014

Date Last Updated:
07 May 2014

Document Revision:
12

FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.

Leave a Reply