First published: Tue Oct 10 2023(Updated: )
A use of GET request method with sensitive query strings vulnerability [CWE-598] in the FortiOS SSL VPN component may allow an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services (found in logs, referers, caches, etc...)
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS and FortiProxy SSL-VPN |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-120 is considered high due to the potential exposure of sensitive information through GET requests.
To fix FG-IR-23-120, ensure that sensitive information is not transmitted via GET requests and apply any available security updates from Fortinet.
FG-IR-23-120 affects the Fortinet FortiOS SSL VPN component.
The risk associated with FG-IR-23-120 is that an attacker could potentially view plaintext passwords and gain unauthorized access to remote services.
Mitigation for FG-IR-23-120 includes implementing proper logging practices and restricting access to logs that may contain sensitive query strings.