
====================================================================

                             CERT-Renater

                 Note d'Information No. 2020/VULN617
_____________________________________________________________________

DATE                : 12/11/2020

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running FortiMail, FortiADC versions prior
                                           to 14.2.

=====================================================================
https://www.fortiguard.com/psirt/FG-IR-20-105
https://www.fortiguard.com/psirt/FG-IR-20-044
_____________________________________________________________________

FortiMail software-version detection vulnerability


Summary

An exposure of sensitive information to an unauthorized actor
vulnerability in FortiMail may allow a remote, unauthenticated attacker
to obtain potentially sensitive software-version information by reading
a JavaScript file.


Impact

Information disclosure.


Affected Products

FortiMail versions 6.0.9 and below. FortiMail versions 6.2.4 and below
FortiMail versions 6.4.1 and below.


Solutions

Please upgrade to FortiMail versions 6.0.10 or above. Please upgrade to
FortiMail versions 6.2.5 or above. Please upgrade to FortiMail versions
6.4.2 or above.


Acknowledgement

Fortinet is pleased to thank Patrick Schmid from Redguard for reporting
this vulnerability under responsible disclosure.

_____________________________________________________________________

FortiADC is vulnerable to retrieval of sensitive information in
cleartext via GUI


Summary

A cleartext storage of sensitive information in GUI in FortiADC may
allow a remote authenticated attacker to retrieve some sensitive
information such as users LDAP passwords and RADIUS shared secret by
deobfuscating the passwords entry fields.


Impact

Information disclosure


Affected Products

FortiADC versions 6.0.0 and below. FortiADC versions 5.4.3 and below.


Solutions

Please upgrade to FortiADC versions 6.0.1 or above. Please upgrade to
FortiADC versions 5.4.4 or above.


Acknowledgement

Fortinet is pleased to thank Harish Chowdary for reporting this
vulnerability under responsible disclosure.



=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================


