CVE-2018-13379

An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:46

Type Values Removed Values Added
References () https://fortiguard.com/advisory/FG-IR-18-384 - Mitigation, Vendor Advisory () https://fortiguard.com/advisory/FG-IR-18-384 - Mitigation, Vendor Advisory
References () https://www.fortiguard.com/psirt/FG-IR-20-233 - Vendor Advisory () https://www.fortiguard.com/psirt/FG-IR-20-233 - Vendor Advisory
CVSS v2 : 5.0
v3 : 9.8
v2 : 5.0
v3 : 9.1

25 Jul 2024, 14:09

Type Values Removed Values Added
First Time Fortinet fortiproxy
References () https://www.fortiguard.com/psirt/FG-IR-20-233 - () https://www.fortiguard.com/psirt/FG-IR-20-233 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*

03 Jun 2021, 11:15

Type Values Removed Values Added
References
  • {'url': 'https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf', 'name': 'https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf', 'tags': ['Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'https://github.com/blacklotuslabs/Development/blob/master/Mitigations/CVE/CVE-2018-13379/CVE-2018-13379%20-%20Summary%20%26%20Emergency%20Mitigations.pdf', 'name': 'https://github.com/blacklotuslabs/Development/blob/master/Mitigations/CVE/CVE-2018-13379/CVE-2018-13379%20-%20Summary%20%26%20Emergency%20Mitigations.pdf', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/', 'name': 'https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • {'url': 'http://packetstormsecurity.com/files/154147/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html', 'name': 'http://packetstormsecurity.com/files/154147/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'http://packetstormsecurity.com/files/154146/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html', 'name': 'http://packetstormsecurity.com/files/154146/FortiOS-5.6.7-6.0.4-Credential-Disclosure.html', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'MISC'}
  • {'url': 'http://www.securityfocus.com/bid/108693', 'name': '108693', 'tags': ['Third Party Advisory', 'VDB Entry'], 'refsource': 'BID'}
  • (CONFIRM) https://www.fortiguard.com/psirt/FG-IR-20-233 -
Summary An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests. An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.

Information

Published : 2019-06-04 21:29

Updated : 2025-01-27 21:30


NVD link : CVE-2018-13379

Mitre link : CVE-2018-13379

CVE.ORG link : CVE-2018-13379


JSON object : View

Products Affected

fortinet

  • fortios
  • fortiproxy
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')