First published: Tue Mar 20 2018(Updated: )
An Improper Access Control vulnerability in Fortinet FortiWeb 5.6.0 up to but not including 6.1.0 under "Signed Security Mode", allows attacker to bypass the signed user cookie protection by removing the FortiWeb own protection session cookie.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=5.6.0<6.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE-2017-14191 vulnerability is classified as having a medium severity due to its potential to allow attackers to bypass authentication mechanisms.
To fix CVE-2017-14191, upgrade Fortinet FortiWeb to version 6.1.0 or later.
CVE-2017-14191 affects Fortinet FortiWeb versions ranging from 5.6.0 up to, but not including, 6.1.0.
CVE-2017-14191 is an Improper Access Control vulnerability that allows cookie protection bypass.
Organizations using affected versions of Fortinet FortiWeb could be compromised by attackers exploiting this vulnerability.