FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Article Id 250179

This article describes the discovery of Backup File Disclosure vulnerability observed on FortiOS 7.0.x and 7.2.x by Nessus Vulnerability Scanner


Scope FortiOS 7.0.x, 7.2.x.

This has been confirmed to be a false positive response as the FortiOS web server would reply to an invalid path HTTP request with HTTP 404 error:




The user can also attempt to download the file by using an external tool such as wget or curl. The tool used will be wget, as an example:


> wget.exe -S --no-check-cert https://<FortiGate_IP>/.htaccess




The command above will download the .htaccess file into the folder where this command is run. Unzip the file downloaded and it will be possible to review the content in the unzipped file.


Viewing the file will confirm that the file served by FortiGate is just an index.html file compressed with gzip that redirects to the login page via javascript.




Hence, this has been confirmed to be a false positive discovery on FortiOS 7.0.x and 7.2.x.