[] NeoSense

Fortigate Firewall 2.x - dlg Admin Interface Cross-Site Scripting

Author: Maarten Hartsuijker
type: remote
platform: hardware
port: 
date_added: 2003-11-12 
date_updated: 2012-12-13 
verified: 1 
codes: OSVDB-3289 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/9033/info

Multiple cross-site scripting vulnerabilities have been reported in the FortiGate Firewall web administrative interface.

These issues could be exploited by enticing an administrative user to follow a malicious link that includes hostile HTML and script code as values for URI parameters. If such a link is followed, the hostile code may be rendered in the administrator's browser. This could lead to theft of cookie-based authentication credentials, which contain the username and MD5 hash of the password, allowing for full compromise of the firewall.

https://www.example.com/firewall/policy/dlg?q=-1&fzone=t<script>alert('oops')</script>>&tzone=dmz