First published: Tue May 28 2019(Updated: )
An Improper Neutralization of Script-Related HTML Tags in Fortinet FortiAnalyzer 5.6.0 and below and FortiManager 5.6.0 and below allows an attacker to send DHCP request containing malicious scripts in the HOSTNAME parameter. The malicious script code is executed while viewing the logs in FortiAnalyzer and FortiManager (with FortiAnalyzer feature enabled).
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiAnalyzer | <=5.6.0 | |
Fortinet FortiManager | <=5.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-13375.
The severity of CVE-2018-13375 is medium with a CVSS score of 6.1.
Fortinet FortiAnalyzer versions 5.6.0 and below, as well as Fortinet FortiManager versions 5.6.0 and below, are affected.
An attacker can send a DHCP request with malicious scripts in the HOSTNAME parameter, which are executed when viewing logs in FortiAnalyzer.
Yes, Fortinet has released patches to address the vulnerability. It is recommended to update to the latest version of FortiAnalyzer and FortiManager.