• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Oracle VM VirtualBox Multiple Vulnerabilities
November 20, 2018
Rewterz Threat Advisory – FASTCASH ATM CYBER ESPIONAGE INTRODUCES A NEW AIX TROJAN
November 20, 2018

Rewterz Threat Advisory – CVE-2018-13375 – Fortinet FortiAnalyzer Cross-site scripting Vulnerability

November 20, 2018

A vulnerability has been reported in Fortinet FortiAnalyzer, which can be exploited by malicious people to conduct script insertion attacks.

 

 

IMPACT:  NORMAL

 

 

PUBLISH DATE:  20-11-2018

 

 

OVERVIEW

 

 

A vulnerability has been discovered in Fortinet FortiOS and FortiAnalyzer which may allow an attacker to cause a security bypass, a breach of data privacy and an indirect code injection (XSS).

 

 

ANALYSIS

 

 

An indirect code injection (cross-site scripting: XSS) vulnerability is found in FortiAnalyzer and FortiOS. The flaw occurs when certain input related to DHCP Hostname is not properly sanitized before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user’s browser session in context of an affected site if malicious data is seen.

 

An attacker could send DHCP request containing malicious scripts in the HOSTNAME parameter. The malicious script code is executed while viewing the logs in FortiAnalyzer.

 

Successful exploitation of this vulnerability may lead to bypass of certain security restrictions and may compromise an organization’s confidential data by disclosing unauthorized information.

 

 

AFFECTED PRODUCTS

 

 

Fortinet FortiAnalyzer 5.4

 

 

UPDATES

 

 

Update to version 5.6 or above.

 

If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.

  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.