FortiOS XSS vulnerabilities via FortiView Application filter, FortiToken activation & SSL VPN Replacement Messages

Summary

Three XSS vulnerabilities

  • one via the the filter input in "Applications" under FortiView (CVE-2017-3131)
  • the second via the action input during the activation of a FortiToken (CVE-2017-3132)
  • the third via the Replacement Message HTML for SSL-VPN (CVE-2017-3133)

can be exploited by logged-in users only to load and run a remote (malicious) Javascript in a logged in browser.

Affected Products

* CVE-2017-3131 : FortiOS versions 5.4.0 to 5.6.0
* CVE-2017-3132 : FortiOS versions upto 5.6.0
* CVE-2017-3133 : FortiOS versions upto 5.6.0

Solutions

Upgrade to FortiOS version 5.6.1

Acknowledgement

Fortinet is pleased to thank Patryk Bogdan of Secorda for reporting this vulnerability under responsible disclosure.