
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN131
_____________________________________________________________________

DATE                : 12/03/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running FortiWeb versions prior to 6.0.6,
                                         6.1.2, 6.2.3.

=====================================================================
https://fortiguard.com/psirt/FG-IR-19-265
https://fortiguard.com/psirt/FG-IR-19-269
https://fortiguard.com/psirt/FG-IR-20-001
_____________________________________________________________________

XSS vulnerability in the Anomaly Detection Parameter Name

IR Number : FG-IR-19-265
Date      : Mar 09, 2020
Risk      : 3/5
Impact    : Unauthorized code execution
CVE ID    : CVE-2019-16156
CVE ID    : CVE-2019-16156
CVE ID    : CVE-2019-16156

Summary

An improper neutralization of input vulnerability in the Anomaly
Detection interface of FortiWeb may allow a remote unauthenticated
attacker to perform a cross site scripting attack (XSS) via a
parameter of the request.


Impact

Unauthorized code execution


Affected Products

FortiWeb Versions 6.0.5 and below.

FortiWeb Versions 6.1.1 and below.

FortiWeb Version 6.2.0


Solutions

Please upgrade to FortiWeb versions 6.0.6 or above

Please upgrade to FortiWeb versions 6.1.2 or above

Please upgrade to FortiWeb versions 6.2.1 or above


Acknowledgement

Fortinet is pleased to thank Pablo Arriaga Perez from Government of
Navarre and S21sec for reporting this vulnerability under responsible
disclosure.

-
--------------------------------------------------------------------------------

Information disclosure through diagnose debug commands in FortiWeb

IR Number : FG-IR-19-269
Date      : Mar 11, 2020
Risk      : 3/5
Impact    : Information disclosure
CVE ID    : CVE-2019-16157
CVE ID    : CVE-2019-16157


Summary

An information exposure vulnerability in FortiWeb CLI may allow an
authenticated user to view sensitive information being logged via
diagnose debug commands.


Impact

Information disclosure


Affected Products

FortiWeb 6.2.0 and below.


Solutions

Please upgrade to FortiWeb 6.3.0, 6.2.1 or above.

Acknowledgement

Fortinet is pleased to thank Danilo Costa from PBI for reporting this
vulnerability under responsible disclosure.

-
--------------------------------------------------------------------------------

XSS Vulnerability in Disclaimer Description of a Replacement Message in
FortiWeb

IR Number : FG-IR-20-001
Date      : Mar 09, 2020
Risk      : 3/5
Impact    : Unauthorized code execution
CVE ID    : CVE-2020-6646
CVE ID    : CVE-2020-6646
CVE ID    : CVE-2020-6646


Summary

An improper neutralization of input vulnerability in FortiWeb may allow
a remote authenticated attacker to perform a stored cross site scripting
attack (XSS) via the Disclaimer Description of a Replacement Message.


Impact

Unauthorized code execution


Affected Products

FortiWeb version 6.2.2 and below.

FortiWeb version 6.3.0.


Solutions

Please upgrade to FortiWeb version 6.2.3 or above

Please upgrade to FortiWeb version 6.3.1 or above


Acknowledgement

Fortinet is pleased to thank Danilo Costa from PBI for reporting this
vulnerability under responsible disclosure.



=========================================================
+ CERT-RENATER        | tel : 01-53-94-20-44            +
+ 23/25 Rue Daviel    | fax : 01-53-94-20-41            +
+ 75013 Paris         | email:cert@support.renater.fr   +
=========================================================




