Skip to content

Latest commit

 

History

History

CVE-2018-13382

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 

CVE-2018-13382
Fortigate SSL-VPN Local Users Password Changer

A really funny crafted HTTP request! 😀

Description

An improper authorization vulnerability in the SSL-VPN web portal may allow an unauthenticated attacker to change the password of a SSL-VPN web portal user via specially crafted HTTP requests. Work only if the SSL-VPN service ("web-mode" or "tunnel-mode") is enabled and users with local authentication are affected, SSL-VPN web portal users with remote authentication like LDAP or RADIUS are not impacted.

Author

Credits

Affected Products

  • FortiOS 5.4.1 to 5.4.10
  • FortiOS 5.6.0 to 5.6.8
  • FortiOS 6.0.0 to 6.0.4

Advisories

References

Date of public disclosure

May 24th, 2019

Google Dork

intitle:"Please Login" intext:"Please Login" inurl:"/remote/login"

Usage

$ python CVE-2018-13382.py -r <RHOST> -p <RPORT> -u <LOCAL_USERNAME>
$ python CVE-2018-13382.py -r 192.168.0.2 -p 443 -u user1

Tested against

  • FortiOS 5.4.6
  • FortiOS 5.6.5
  • FortiOS 6.0.0
  • FortiOS 6.0.2

Solution

Upgrade FortiOS.

Workaround

Migrate SSL-VPN user authentication from local to remote (LDAP or RADIUS) or totally disable the SSL-VPN service (both "web-mode" and "tunnel-mode").

License

Usage is provided under the WTFPL license.
See LICENSE for the full details.