Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2018-13383


A heap buffer overflow in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.10, 5.4.0 through 5.4.12, 5.2.14 and earlier and FortiProxy 2.0.0, 1.2.8 and earlier in the SSL VPN web portal may cause the SSL VPN web service termination for logged in users due to a failure to properly handle javascript href data when proxying webpages.


Published

2019-05-29T18:29:00.693

Last Modified

2025-01-27T21:30:37.930

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-787
  • Type: Secondary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiproxy < 1.2.9 Yes
Application fortinet fortiproxy 2.0.0 Yes
Operating System fortinet fortios < 5.2.15 Yes
Operating System fortinet fortios < 5.4.13 Yes
Operating System fortinet fortios < 5.6.11 Yes
Operating System fortinet fortios < 6.0.5 Yes

References