Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
A vulnerability has been reported in Fortinet FortiAnalyzer, which can be exploited by malicious people to conduct script insertion attacks.
IMPACT: NORMAL
PUBLISH DATE: 20-11-2018
OVERVIEW
A vulnerability has been discovered in Fortinet FortiOS and FortiAnalyzer which may allow an attacker to cause a security bypass, a breach of data privacy and an indirect code injection (XSS).
ANALYSIS
An indirect code injection (cross-site scripting: XSS) vulnerability is found in FortiAnalyzer and FortiOS. The flaw occurs when certain input related to DHCP Hostname is not properly sanitized before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user’s browser session in context of an affected site if malicious data is seen.
An attacker could send DHCP request containing malicious scripts in the HOSTNAME parameter. The malicious script code is executed while viewing the logs in FortiAnalyzer.
Successful exploitation of this vulnerability may lead to bypass of certain security restrictions and may compromise an organization’s confidential data by disclosing unauthorized information.
AFFECTED PRODUCTS
Fortinet FortiAnalyzer 5.4
UPDATES
Update to version 5.6 or above.
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.