Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
davbu
New Contributor

Clarity on PSIRT Advisory FG-IR-23-120

I am seeking clarity on this advisory.

 

A use of GET request method with sensitive query strings vulnerability [CWE-598] in the FortiOS SSL VPN component may allow an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services (found in logs, referers, caches, etc...)

 

We have several employees who SSLVPN using the FortiGate VPN client.  They then RDP to a Windows VM server.  In this instances how can an attacker view the plaintext passwords using the GET request?  As I understand a GET request is an http request and RDP uses protocol 3389.  Fortinet Support was not helpful in explaining the logic behind the advisory.  Can someone help me understand how an attacker can do this?

2 Solutions
srajeswaran

That is correct.

Regards,

Suraj

- Have you found a solution? Then give your helper a "Kudos" and mark the solution.

View solution in original post

srajeswaran



you can disable the webmode as explained in  https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-SSL-VPN-Web-Mode-or-Tunnel-...

 

In this example SSL-VPN Mode portal.

 

# config vpn ssl web portal

    edit "SSLVPN Mode"

        set web-mode disable  <----- Unset web-mode.

        end

end

 



Regards,

Suraj

- Have you found a solution? Then give your helper a "Kudos" and mark the solution.

View solution in original post

5 REPLIES 5
srajeswaran
Staff
Staff

When you say "FortiGate VPN client", do you mean they use FortiClient to connect to SSL VPN? If so, you are not affected by this vulnerability. This vulnerability only affects web-mode not tunnel mode.

 

Regards,

Suraj

- Have you found a solution? Then give your helper a "Kudos" and mark the solution.

davbu

Hi Suraj,

Thank you for clarifying.  So this vulnerability only affects if you are using the Browser to sslvpn in correct?

srajeswaran

That is correct.

Regards,

Suraj

- Have you found a solution? Then give your helper a "Kudos" and mark the solution.

davbu

Is there a way to block sslvpn through the browser from the Fortigate?

srajeswaran



you can disable the webmode as explained in  https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-SSL-VPN-Web-Mode-or-Tunnel-...

 

In this example SSL-VPN Mode portal.

 

# config vpn ssl web portal

    edit "SSLVPN Mode"

        set web-mode disable  <----- Unset web-mode.

        end

end

 



Regards,

Suraj

- Have you found a solution? Then give your helper a "Kudos" and mark the solution.

Labels
Top Kudoed Authors