First published: Fri Apr 08 2016(Updated: )
The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the "redirect" parameter to "login."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | =5.0.0 | |
Fortinet FortiOS IPS Engine | =5.0.1 | |
Fortinet FortiOS IPS Engine | =5.0.2 | |
Fortinet FortiOS IPS Engine | =5.0.3 | |
Fortinet FortiOS IPS Engine | =5.0.4 | |
Fortinet FortiOS IPS Engine | =5.0.5 | |
Fortinet FortiOS IPS Engine | =5.0.6 | |
Fortinet FortiOS IPS Engine | =5.0.7 | |
Fortinet FortiOS IPS Engine | =5.0.8 | |
Fortinet FortiOS IPS Engine | =5.0.9 | |
Fortinet FortiOS IPS Engine | =5.0.10 | |
Fortinet FortiOS IPS Engine | =5.0.11 | |
Fortinet FortiOS IPS Engine | =5.0.12 | |
Fortinet FortiOS IPS Engine | =5.2.0 | |
Fortinet FortiOS IPS Engine | =5.2.1 | |
Fortinet FortiOS IPS Engine | =5.2.2 | |
Fortinet FortiOS IPS Engine | =5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3978 has a medium severity rating, allowing attackers to conduct phishing or XSS attacks.
To fix CVE-2016-3978, you should upgrade to FortiOS versions 5.0.13, 5.2.3, or 5.4.0 and later.
CVE-2016-3978 allows for phishing attacks and cross-site scripting (XSS) through user redirection.
CVE-2016-3978 affects FortiOS versions from 5.0.0 to 5.0.12, 5.2.0 to 5.2.2, and 5.4.x prior to 5.4.0.
CVE-2016-3978 exploits the WebUI by manipulating the "redirect" parameter during the login process to redirect users to malicious sites.