A vulnerability has been reported in Fortinet FortiAnalyzer, which can be exploited by malicious people to conduct script insertion attacks.
PUBLISH DATE: 20-11-2018
A vulnerability has been discovered in Fortinet FortiOS and FortiAnalyzer which may allow an attacker to cause a security bypass, a breach of data privacy and an indirect code injection (XSS).
An indirect code injection (cross-site scripting: XSS) vulnerability is found in FortiAnalyzer and FortiOS. The flaw occurs when certain input related to DHCP Hostname is not properly sanitized before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user’s browser session in context of an affected site if malicious data is seen.
An attacker could send DHCP request containing malicious scripts in the HOSTNAME parameter. The malicious script code is executed while viewing the logs in FortiAnalyzer.
Successful exploitation of this vulnerability may lead to bypass of certain security restrictions and may compromise an organization’s confidential data by disclosing unauthorized information.
Fortinet FortiAnalyzer 5.4
Update to version 5.6 or above.
If you think you’re the victim of a cyber-attack, immediately send an email to firstname.lastname@example.org.