Fortinet firması FortiWeb, FortiGate, FortiDeceptor ürünleri için uyarı yayımladı

Fortinet, bazı ürünlerinde orta, bazı ürünlerinde ise yüksek seviyede bulgu saptadıklarını, müşterilerinin yama yapmalarının önem arz ettiğini bildiren bir uyarı yayımladı.

Fortigate 1 Adet, Fortiweb 4 adet, FortiDeceptor 1 adet bulgu yayımlandı.

Link: https://www.fortiguard.com/psirt?date=01-2021

Aşağıda listeyi bulabilirsiniz;

Ürün: Fortigate

CVE: CVE-2020-29010

Summary

An exposure of sensitive information to an unauthorized actor vulnerability in FortiGate may allow a remote authenticated attacker to read the SSL VPN events log entries of users in other VDOMs by  executing “get vpn ssl monitor” from the CLI. The sensitive data includes usernames, user groups, and IP addresses.

Affected Products

FortiGate versions 6.0.10 and below. 

FortiGate versions 6.2.4 and below. 

FortiGate versions 6.4.1 and below.

Solutions

Please upgrade to FortiGate version 6.0.11 or above. 

Please upgrade to FortiGate version 6.2.5 or above.

Please upgrade to FortiGate version 6.4.2 or above.

Ürün: FortiWeb

CVE: CVE-2020-29015

FortiWeb is vulnerable to a blind SQL injection

Summary

A blind SQL injection in the user interface of FortiWeb may allow an unauthenticated, remote attacker to execute arbitrary SQL queries or commands by sending a request with a crafted Authorization header containing a malicious SQL statement.

Affected Products

FortiWeb versions 6.3.7 and below. 

FortiWeb versions 6.2.3 and below.

Solutions

Please upgrade to FortiWeb versions 6.3.8 or above.

Please upgrade to FortiWeb versions 6.2.4 or above.

CVE: CVE-2020-29016

Stack-Based Buffer Overflow vulnerability in FortiWeb

Summary

A stack-based buffer overflow vulnerability in FortiWeb may allow an unauthenticated, remote attacker to overwrite the content of the stack and potentially execute arbitrary code by sending a crafted request with a large certname.

Impact

Execute unauthorized code or commands

Affected Products

FortiWeb versions 6.3.5 and below. 

FortiWeb versions 6.2.3 and below.

Solutions

Please upgrade to FortiWeb versions 6.3.6 or above. 

Please upgrade to FortiWeb versions 6.2.4 or above.

CVE: CVE-2020-29019

FortiWeb is vulnerable to a buffer overflow.

Summary

A stack-based buffer overflow vulnerability in FortiWeb may allow a remote, authenticated attacker to crash the httpd daemon thread by sending a request with a crafted cookie header.

Impact

Denial of service

Affected Products

FortiWeb versions 6.3.7 and below. 

FortiWeb versions 6.2.3 and below.

Solutions

Please upgrade to FortiWeb versions 6.3.8 or above. 

Please upgrade to FortiWeb versions 6.2.4 or above.

CVE: CVE-2020-29018

FortiWeb is vulnerable to a Format string vulnerability

Summary

A format string vulnerability in FortiWeb may allow an authenticated, remote attacker to read the content of memory and retrieve sensitive data via the redir parameter.

Impact

Execute unauthorized code or commands

Affected Products

FortiWeb versions 6.3.5 and below.

Solutions

Please upgrade to FortiWeb versions 6.3.6 or above.

Ürün: FortiDeceptor

CVE: CVE-2020-29017

FortiDeceptor is impacted by an OS command injection vulnerability

Summary

An OS command injection vulnerability in FortiDeceptor may allow a remote authenticated attacker to execute arbitrary commands on the system by exploiting a command injection vulnerability on the Customization page.

Impact

Execute unauthorized code or commands

Affected Products

FortiDeceptor versions 3.1.0 and below.

FortiDeceptor versions 3.0.1 and below.

Solutions

Please upgrade to FortiDeceptor versions 3.2.0 or above.

Please upgrade to FortiDeceptor versions 3.1.1 or above.

Please upgrade to FortiDeceptor versions 3.0.2 or above.

Exit mobile version