<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>[FortiOS] file leaking through SSL VPN language resource request</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-18-384</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2019-05-24T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2019-05-24T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2019-05-24T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            A path traversal vulnerability in the FortiOS SSL VPN web portal may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Information disclosure
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiOS 6.0 - 6.0.0 to 6.0.4FortiOS 5.6 - 5.6.3 to 5.6.7FortiOS 5.4 - 5.4.6 to 5.4.12(other branches and versions than above are not impacted)ONLY if the SSL VPN service (web-mode or tunnel-mode) is enabled.
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Upgrade to FortiOS 5.4.13, 5.6.8, 6.0.5 or 6.2.0 and above.Workarounds:As a temporary solution, the only workaround is to totally disable the SSL-VPN service (both web-mode and tunnel-mode) by applying the following CLI commands:config vpn ssl settingsunset source-interfaceendNote that firewall policies tied to SSL VPN will need to be unset first for the above sequence to execute successfully.As an example, when source-interface is &#34;port1&#34; and SSL VPN interface is &#34;ssl.root&#34;, the following CLI commands would be needed to ensure &#34;unset source-interface&#34; executes successfully:config vpn ssl settings config authentication-rulepurge (purge all authentication-rules)endendconfig firewall policy delete [policy-id] (SSL VPN policy ID(s) that srcintf is &#34;ssl.root&#34; and dstintf is &#34;port1&#34;)endNote that code to exploit this vulnerability in order to obtain the credentials of logged in SSL VPN users was disclosed. In absence of upgrading to the versions listed above, mitigating the impact of this exploit can be done by enabling two-factor authentication for SSL VPN users. An attacker would then not be able to use stolen credentials to impersonate SSL VPN users. 2019-05-24 Initial version2019-06-04 Clarified the impacted versions and workarounds.2019-08-30 FortiOS 5.4 branch (starts from 5.4.6) also affected and fix scheduled..2019-08-30 two-factor authentication mitigation added for the disclosed exploit.2019-08-30 Add public disclosure reference link.2019-11-26 New fix on 5.4.13 released.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-18-384</cvrf:URL>
            <cvrf:Description>[FortiOS] file leaking through SSL VPN language resource request</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</cvrf:URL>
            <cvrf:Description>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Meh Chang and Orange Tsai from DEVCORE Security Research Team for reporting this vulnerability under responsible disclosure.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>[FortiOS] file leaking through SSL VPN language resource request</Title>
        <cvrf:CVE>CVE-2018-13379</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>8.9</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-18-384</URL>
                <Description>[FortiOS] file leaking through SSL VPN language resource request</Description>
            </Reference>Reference>
            <Reference>
                <URL>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</URL>
                <Description>https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>