First published: Wed May 04 2022(Updated: )
A server-generated error message containing sensitive information in Fortinet FortiOS 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.x, 6.0.x and FortiProxy 7.0.0 through 7.0.1, 2.0.x allows malicious webservers to retrieve a web proxy's client username and IP via same origin HTTP requests triggering proxy-generated HTTP status codes pages.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=2.0.0<2.0.9 | |
Fortinet FortiProxy | >=7.0.0<7.0.2 | |
Fortinet FortiOS | >=5.6.0<6.0.14 | |
Fortinet FortiOS | >=6.2.0<6.2.10 | |
Fortinet FortiOS | >=6.4.0<6.4.8 | |
Fortinet FortiOS | >=7.0.0<7.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43206 is a vulnerability in Fortinet FortiOS and FortiProxy that allows malicious webservers to retrieve a web proxy's client username and IP.
Fortinet FortiOS versions 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.x, 6.0.x, and FortiProxy versions 7.0.0 through 7.0.1, 2.0.x are affected by CVE-2021-43206.
CVE-2021-43206 has a severity score of 4.3 (medium).
A malicious webserver can exploit CVE-2021-43206 by triggering a server-generated error message that contains sensitive information, allowing it to retrieve a web proxy's client username and IP.
Yes, Fortinet has released patches to address the vulnerability. It is recommended to update to the latest version of Fortinet FortiOS or FortiProxy to mitigate the risk.