Fortinet FortiAuthenticator 'operation' Parameter XSS

high Nessus Plugin ID 81383

Synopsis

The remote host is affected by a cross-site scripting vulnerability.

Description

The remote Fortinet FortiAuthenticator appliance is affected by a cross-site scripting vulnerability due to improper validation of input to the 'operation' parameter of the SCEP service.

Appliances affected by this issue are likely affected by multiple other issues that; however, Nessus did not test for these. See the linked advisory for further details.

Solution

The vendor has yet to release a patch. As a workaround, restrict access to the appliance.

See Also

http://www.nessus.org/u?78acca25

Plugin Details

Severity: High

ID: 81383

File Name: fortiauthenticator_cve_2015_1459.nasl

Version: 1.7

Type: remote

Published: 2/16/2015

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-1455

Vulnerability Information

CPE: cpe:/a:fortinet:fortiauthenticator

Required KB Items: installed_sw/Fortinet FortiAuthenticator

Exploit Ease: No exploit is required

Exploited by Nessus: true

Vulnerability Publication Date: 1/29/2015

Reference Information

CVE: CVE-2015-1455, CVE-2015-1456, CVE-2015-1457, CVE-2015-1458, CVE-2015-1459

BID: 72378