CVE-2018-13382

An Improper Authorization vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.8 and 5.4.1 to 5.4.10 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to modify the password of an SSL VPN web portal user via specially crafted HTTP requests
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:46

Type Values Removed Values Added
CVSS v2 : 5.0
v3 : 7.5
v2 : 5.0
v3 : 9.1
References () https://fortiguard.com/advisory/FG-IR-18-389 - Vendor Advisory () https://fortiguard.com/advisory/FG-IR-18-389 - Vendor Advisory
References () https://www.fortiguard.com/psirt/FG-IR-20-231 - Vendor Advisory () https://www.fortiguard.com/psirt/FG-IR-20-231 - Vendor Advisory

24 Jul 2024, 17:00

Type Values Removed Values Added
CWE CWE-285 CWE-863
First Time Fortinet fortiproxy
References () https://fortiguard.com/advisory/FG-IR-18-389 - Mitigation, Vendor Advisory () https://fortiguard.com/advisory/FG-IR-18-389 - Vendor Advisory
References () https://www.fortiguard.com/psirt/FG-IR-20-231 - () https://www.fortiguard.com/psirt/FG-IR-20-231 - Vendor Advisory
CPE cpe:2.3:a:fortinet:fortiproxy:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*
CVSS v2 : 5.0
v3 : 9.1
v2 : 5.0
v3 : 7.5

Information

Published : 2019-06-04 21:29

Updated : 2024-11-21 03:46


NVD link : CVE-2018-13382

Mitre link : CVE-2018-13382

CVE.ORG link : CVE-2018-13382


JSON object : View

Products Affected

fortinet

  • fortiproxy
  • fortios
CWE
CWE-863

Incorrect Authorization