Fortinet has released PSIRT FG-IR-19-184 (CVE-2019-6697) about a vulnerability in FortiOS of the FortiGate firewall. A DHCP packet may contain a stored XSS in the hostname parameter field.
Affected Versions and Update
Affected Products are FortiOS 6.2.1 and below & FortiOS 6.0.6 and below.
FortiOS 6.2.2 and FortiOS 6.0.7 fix the vulnerability
PoC/Vulnerability Details from ssd-disclosure.com
Source: https://ssd-disclosure.com/archives/3987/ssd-advisory-fortigate-dhcp-stored-xssAn unauthenticated attacker can trigger a Stored XSS Vulnerability via a malicious DHCP packet in the Fortigate DHCP Monitor.
This can happen if Device Detection is enabled through Network >Interface > Edit Interface > Device Detection
When this option is enabled the attacker may perform the following steps in order to exploit the vulnerability:
- Install dhtest or any other tool that can send arbitrary DHCP packets.
(https://sargandh.wordpress.com/2012/02/23/linux-dhcp-client-simulation-tool/) - Send a malicious DHCP packet. For example:
No comments:
Post a Comment