FortiSIEM LDAP server password reflected in admin portal
Fortinet PSIRT Advisories
Fortinet PSIRT Contact:
Website: https://fortiguard.fortinet.com/faq/psirt-contact
FG-IR-18-382
Final
1
1
2019-03-29T00:00:00
Current version
2019-03-29T00:00:00
2019-03-29T00:00:00
An information exposure vulnerability in the admin portal of FortiSIEM may allow an authenticated admin to retrieve the LDAP server password via the HTML source code. This could potentially aggravate attacks targeting the authenticated admin session, should they exist (XSS, social engineering, proxy caching...).
Information Disclosure
FortiSIEM 5.2.0 and below
Upgrade to FortiSIEM 5.2.1
Fortinet is pleased to thank Yusuf TOPAL from Beyaz Bilgisayar Danismanlik Hizmetleri Ltd. Sti. for reporting this vulnerability under responsible disclosure.
FortiSIEM 5.1.3
FortiSIEM 5.1.2
FortiSIEM 5.1.1
FortiSIEM 5.1.0
FortiSIEM 5.0.1
FortiSIEM 5.0.0
FortiSIEM 4.10.0
FortiSIEM 4.9.0
FortiSIEM LDAP server password reflected in admin portal
CVE-2018-13378
FortiSIEM-5.1.3
FortiSIEM-5.1.2
FortiSIEM-5.1.1
FortiSIEM-5.1.0
FortiSIEM-5.0.1
FortiSIEM-5.0.0
FortiSIEM-4.10.0
FortiSIEM-4.9.0
4.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:F/RL:X/RC:X
https://fortiguard.fortinet.com/psirt/FG-IR-18-382
FortiSIEM LDAP server password reflected in admin portal
Reference>