A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-18-388 | Mitigation Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-20-229 | Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-18-388 | Mitigation Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-20-229 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/advisory/FG-IR-18-388 - Mitigation, Vendor Advisory | |
References | () https://fortiguard.com/advisory/FG-IR-20-229 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 4.3 |
24 Oct 2024, 13:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/advisory/FG-IR-18-388 - Mitigation, Vendor Advisory |
Information
Published : 2019-05-29 18:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-13383
Mitre link : CVE-2018-13383
CVE.ORG link : CVE-2018-13383
JSON object : View
Products Affected
fortinet
- fortiproxy
- fortios
CWE
CWE-787
Out-of-bounds Write