SB2023092716 - Multiple vulnerabilities in FortiTester



SB2023092716 - Multiple vulnerabilities in FortiTester

Published: September 27, 2023

Security Bulletin ID SB2023092716
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) OS Command Injection (CVE-ID: CVE-2023-36642)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to improper input validation in FortiGuard explicit proxy setting within the management interface of FortiTester. A remote privileged user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.


2) Cleartext storage of sensitive information (CVE-ID: CVE-2023-40715)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to FortiTeste stores in clear text passwords of external servers configured in the device. A local user can gain access to sensitive information.


3) Use of hard-coded credentials (CVE-ID: CVE-2023-40717)

The vulnerability allows a local user to gain full access to the database.

The vulnerability exists due to presence of hard-coded credentials in application code. A local user with shell access to the system can gain unauthorized access to the mongodb database.


Remediation

Install update from vendor's website.