Nytro Posted May 7, 2012 Report Posted May 7, 2012 [h=1]Fortinet FortiWeb Web Application Firewall Policy Bypass[/h]BINAR10 Report on Fortinet Fortiweb Findings 02/05/2012- Fortinet FortiWeb Web Application Firewall Policy Bypass -============================================================1) Affected ProductFabricant: FortinetProduct name: FortiWebVersion: Latest update to Tue, 2 May 2012Type: Web Application FirewallProduct URL:http://www.fortinet.com/products/fortiweb/index.html2) Description of the FindingsBINAR10 has found a policy bypass occurrence when large size data is sent inPOST (data) or GET request.3) Technical Details3.1. POST Request ExampleWhen is appended to a POST request any padding data that surpasses 2399 bytes,the WAF do not inspect the data sent and the request hits directly theapplication. This should occur when the product is not configured to blockmalformed requests, but this feature also check the POST size limit, blockingthe request if it surpass a fixed limit, therefore is likely that is beingdisabled due to application requirements in medium size forms.The response is also not verified by the WAF and information disclosure occurswith details of the infrastructure.This bypass could be used to inject different types of vectors, as is shown inthe example only is needed to append a new variable at the end of the POSTdata filled with arbitrary data that exceeds 2399 bytes.---POST examplePOST /<path>/login-app.aspx HTTP/1.1Host: <host>User-Agent: <any valid user agent string>Accept-Encoding: gzip, deflateConnection: keep-aliveContent-Type: application/x-www-form-urlencodedContent-Length: <the content length must be at least 2399 bytes>var1=datavar1&var2=datavar12&pad=<random data to complete at least 2399 bytes>3.2. GET RequestsThe same issue with POST Request but it could be done through the sendingarbitrary data at the end of the URL.--GET examplehttp://<domain>/path?var1=vardata1&var2=vardata2&pad=<large arbitrary data>4. Validation RequiredIt requires the validation of other researchers who have access to product.5. Time Table04/27/2012 - Vendor notified.04/27/2012 - Vendor response, requiring some tests.05/02/2012 - Vendor indicates that this is a configuration problem and nota product vulnerability.6. CreditsGeffrey Velasquez <geffrey at gmail.com> at BINAR10 S.A.C.Sursa: Fortinet FortiWeb Web Application Firewall Policy Bypass Quote