The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Fortinet FortiManager Virtual Appliance

security bulletin CVE-2018-1355

FortiAnalyzer, FortiManager: open redirect via PDF File

Synthesis of the vulnerability

An attacker can deceive the user via PDF File of FortiAnalyzer/FortiManager, in order to redirect him to a malicious site.
Severity: 1/4.
Creation date: 25/06/2018.
Identifiers: CERTFR-2018-AVI-303, CVE-2018-1355, FG-IR-18-022, VIGILANCE-VUL-26527.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can deceive the user via PDF File of FortiAnalyzer/FortiManager, in order to redirect him to a malicious site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-1354

FortiAnalyzer, FortiManager: Cross Site Scripting via Avatar Picture

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via Avatar Picture of FortiAnalyzer/FortiManager, in order to run JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 25/06/2018.
Identifiers: CERTFR-2018-AVI-303, CVE-2018-1354, FG-IR-18-014, VIGILANCE-VUL-26526.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can trigger a Cross Site Scripting via Avatar Picture of FortiAnalyzer/FortiManager, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-1351

FortiManager: Cross Site Scripting

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of FortiManager, in order to run JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 25/06/2018.
Identifiers: CERTFR-2018-AVI-303, CVE-2018-1351, FG-IR-18-006, VIGILANCE-VUL-26525.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The FortiManager product offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of FortiManager, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

cybersecurity threat CVE-2017-3126

FortiAnalyzer, FortiManager: open redirect

Synthesis of the vulnerability

An attacker can deceive the user of FortiAnalyzer / FortiManager, in order to redirect him to a malicious site.
Severity: 1/4.
Creation date: 19/05/2017.
Identifiers: CVE-2017-3126, FG-IR-17-014, VIGILANCE-VUL-22773.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The FortiAnalyzer / FortiManager product offers a web service.

However, the web service accepts to redirect the victim with no warning, to an external site indicated by the attacker.

An attacker can therefore deceive the user of FortiAnalyzer / FortiManager, in order to redirect him to a malicious site.
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2015-7363

FortiAnalyzer, FortiManager: Cross Site Scripting via Report Filters

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting via Report Filters of FortiAnalyzer or FortiManager, in order to run JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 06/10/2016.
Identifiers: CVE-2015-7363, VIGILANCE-VUL-20790.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The FortiAnalyzer and FortiManager products offers a web service.

However, it does not filter received data before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting via Report Filters of FortiAnalyzer or FortiManager, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2016-3193 CVE-2016-3194 CVE-2016-3195

Fortinet FortiManager / FortiAnalyzer: four vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Fortinet FortiManager / FortiAnalyzer.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 4.
Creation date: 16/06/2016.
Revision date: 04/08/2016.
Identifiers: 1624459, 1624561, CVE-2016-3193, CVE-2016-3194, CVE-2016-3195, CVE-2016-3196, VIGILANCE-VUL-19914.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

Several vulnerabilities were announced in Fortinet FortiManager / FortiAnalyzer.

An attacker can trigger a Cross Site Scripting via Add Tags, in order to run JavaScript code in the context of the web site. [severity:2/4; 1624459]

An attacker can trigger a Cross Site Scripting via Predefined Bookmarks, in order to run JavaScript code in the context of the web site. [severity:2/4]

An attacker can trigger a Cross Site Scripting via tabview.htm, in order to run JavaScript code in the context of the web site. [severity:2/4]

An attacker can trigger a Cross Site Scripting via filename, in order to run JavaScript code in the context of the web site. [severity:2/4; 1624561]
Full Vigil@nce bulletin... (Free trial)

weakness 19291

Fortinet FortiManager, FortiAnalyzer: Cross Site Scripting of /report/graphic/upload/

Synthesis of the vulnerability

An attacker can trigger a Cross Site Scripting of Fortinet FortiManager/FortiAnalyzer, in order to run JavaScript code in the context of the web site.
Severity: 2/4.
Creation date: 04/04/2016.
Identifiers: VIGILANCE-VUL-19291.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Fortinet FortiManager/FortiAnalyzer product offers a web service.

However, it does not filter received data from the /report/graphic/upload/ page before inserting them in generated HTML documents.

An attacker can therefore trigger a Cross Site Scripting of Fortinet FortiManager/FortiAnalyzer, in order to run JavaScript code in the context of the web site.
Full Vigil@nce bulletin... (Free trial)

threat alert CVE-2015-3196

OpenSSL: use after free via PSK Identify Hint

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via PSK Identify Hint of an OpenSSL multi-threaded client, in order to trigger a denial of service, and possibly to run code.
Severity: 2/4.
Creation date: 03/12/2015.
Identifiers: 1972951, 1976113, 1976148, 1981612, 2003480, 2003620, 2003673, 9010051, BSA-2016-006, bulletinjan2016, c05398322, CERTFR-2015-AVI-517, cisco-sa-20151204-openssl, cpuoct2017, CVE-2015-3196, DSA-3413-1, FEDORA-2015-d87d60b9a9, FreeBSD-SA-15:26.openssl, HPESBHF03709, JSA10759, NTAP-20151207-0001, openSUSE-SU-2015:2288-1, openSUSE-SU-2015:2289-1, RHSA-2015:2617-01, SA40100, SB10203, SOL12824341, SOL30714460, SOL55540723, SOL86772626, SSA:2015-349-04, USN-2830-1, VIGILANCE-VUL-18437.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The OpenSSL library can be used by a multi-threaded client.

However, in this case, the SSL_CTX structure does not contain an updated PSK Identify Hint. OpenSSL can thus free twice the same memory area.

An attacker can therefore force the usage of a freed memory area via PSK Identify Hint of an OpenSSL multi-threaded client, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

weakness announce CVE-2015-3195

OpenSSL: information disclosure via X509_ATTRIBUTE

Synthesis of the vulnerability

An attacker can read a memory fragment via X509_ATTRIBUTE of OpenSSL processing PKCS#7 or CMS data, in order to obtain sensitive information.
Severity: 2/4.
Creation date: 03/12/2015.
Identifiers: 1972951, 1976113, 1976148, 1985739, 2003480, 2003620, 2003673, 9010051, BSA-2016-006, bulletinjan2016, c05398322, CERTFR-2015-AVI-517, CERTFR-2016-AVI-128, cisco-sa-20151204-openssl, cpuapr2017, cpuoct2016, cpuoct2017, CVE-2015-3195, DSA-3413-1, FEDORA-2015-605de37b7f, FEDORA-2015-d87d60b9a9, FreeBSD-SA-15:26.openssl, HPESBHF03709, JSA10733, JSA10759, NTAP-20151207-0001, openSUSE-SU-2015:2288-1, openSUSE-SU-2015:2289-1, openSUSE-SU-2015:2318-1, openSUSE-SU-2015:2349-1, openSUSE-SU-2016:0637-1, openSUSE-SU-2016:0640-1, openSUSE-SU-2016:1327-1, PAN-SA-2016-0020, PAN-SA-2016-0028, RHSA-2015:2616-01, RHSA-2015:2617-01, RHSA-2016:2054-01, RHSA-2016:2055-01, RHSA-2016:2056-01, SA105, SA40100, SB10203, SOL12824341, SOL30714460, SOL55540723, SOL86772626, SSA:2015-349-04, SUSE-SU-2016:0678-1, USN-2830-1, VIGILANCE-VUL-18436.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The OpenSSL library supports the PKCS#7 and CMS formats.

However, if an X509_ATTRIBUTE structure is malformed, OpenSSL does not initialize a memory area before returning it to the user reading PKCS#7 or CMS data.

It can be noted that SSL/TLS is not impacted.

An attacker can therefore read a memory fragment via X509_ATTRIBUTE of OpenSSL processing PKCS#7 or CMS data, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

cybersecurity weakness CVE-2015-3194

OpenSSL: NULL pointer dereference via Certificate Verification

Synthesis of the vulnerability

An attacker can force a NULL pointer to be dereferenced during the certificate verification of OpenSSL (in client or server mode), in order to trigger a denial of service.
Severity: 2/4.
Creation date: 03/12/2015.
Identifiers: 1972951, 1976113, 1976148, 1985739, 1986593, 2003480, 2003620, 2003673, 9010051, BSA-2016-006, bulletinjan2016, c05398322, CERTFR-2015-AVI-517, cisco-sa-20151204-openssl, cpuoct2017, CVE-2015-3194, DSA-3413-1, FEDORA-2015-605de37b7f, FEDORA-2015-d87d60b9a9, FreeBSD-SA-15:26.openssl, HPESBHF03709, HT209139, JSA10759, NTAP-20151207-0001, openSUSE-SU-2015:2288-1, openSUSE-SU-2015:2289-1, openSUSE-SU-2015:2318-1, openSUSE-SU-2016:0637-1, openSUSE-SU-2016:1327-1, RHSA-2015:2617-01, SA105, SA40100, SB10203, SOL12824341, SOL30714460, SOL55540723, SOL86772626, SSA:2015-349-04, STORM-2015-017, USN-2830-1, VIGILANCE-VUL-18435.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The OpenSSL library can use the RSA PSS algorithm to check the validity of X.509 certificates.

However, if the "mask generation" parameter is missing during the verification of a signature in ASN.1 format, OpenSSL does not check if a pointer is NULL, before using it.

An attacker can therefore force a NULL pointer to be dereferenced during the certificate verification of OpenSSL (in client or server mode), in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Fortinet FortiManager Virtual Appliance: