-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2019.1823.2
            FortiOS SSL VPN web portal Host Header Redirection
                              6 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Fortinet SSL VPN
Publisher:         Fortinet
Operating System:  Network Appliance
Impact/Access:     Provide Misleading Information -- Remote with User Interaction
                   Reduced Security               -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-13384  

Original Bulletin: 
   https://fortiguard.com/psirt/FG-IR-19-002

Revision History:  January  6 2020: New fix on 5.2.15 released
                   May     22 2019: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

FortiOS SSL VPN web portal Host Header Redirection

IR Number : FG-IR-19-002
Date      : May 17, 2019
Risk      : 2/5
Impact    : Improper Access Control
CVE ID    : CVE-2018-13384

Summary

A Host Header Redirection vulnerability exists in FortiOS SSL-VPN web portal:
when an attacker submits specially crafted HTTP requests, the SSL-VPN web
portal may respond with a redirection to websites specified by the attacker.


If a web proxy's cache is poisoned with the aforementioned redirection, users
of this web proxy may be directed to the attacker's specified websites when
trying to access the SSL-VPN web portal.

Impact

Improper Access Control

Affected Products

FortiOS 5.4.0 to 6.0.4, 5.2.14 and below.

Solutions

Upgrade to FortiOS 5.2.15, 6.0.5 or 6.2.0


Workarounds:


The risk is low as the attack needs to be combined with other attacks to have
an impact.


As a measure of precaution, administrators may want to disable the SSL-VPN web
portal service by applying the following CLI commands:

config vpn ssl settings
unset source-interface
end


Revision History:
2019-05-17 Initial version
2020-01-03 New fix on 5.2.15 released.

Acknowledgement

Fortinet is pleased to thank Julio Sanchez from SecureAuth Corporation for
reporting this vulnerability under responsible disclosure.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=l4sC
-----END PGP SIGNATURE-----