- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Qualys scan vulnerability qid 150004 FortiOS 6.4.15
I have 2 standalone FGT200E firewalls running 6.1.15, for the last month Qualys has failed the PCI ASV scan with a detected vulnerability QID150004 Predictable Resource Location Via Forced Browsing, its finding an /image/ file
RESULT:
url: https://x.x.x.x/images/
Payload: https://x.x.x.x/images/
comment:
Original URL is: https://x.x.x.x/
matched: HTTP/1.1 200 OK
I have SSL VPN in tunnel only mode, web mode disabled
I came across an article https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-prevent-the-SSL-VPN-web-login-porta... to stop the web login page from appearing, which i applied to no effect. I also changed all the portals to not allow forticlient download in case this was causing the problem.
Nothing has changed on Qualys that i know of & as mentioned scans were fine until the start of July.
I've searched forums, google etc but not coming across any similar issues.
Solved! Go to Solution.
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This looks like a false positive.
When you send a GET request to https://<your vpn>:<port>/images, the FortiGate seems to respond with a javascript-based redirect to /remote/login (the actual login URL).
Based on a quick reading (feel free to contest this!), the signature QID150004 deals with discovering otherwise-hidden resources via predictable/easy-to-guess paths (such as /images/). In this case, we can clearly see that there's nothing hiding at /images/, it's just a redirect to the regular login.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi pminarik, think you've saved me a tac case, i concur with your findings , i could see the redirect but wondered why qualys didnt follow it.
I was struggling to discover if the qualys output should list the actual files in the /images/ folder but all it returns is a 200Ok which i assume means qualys found a "predictable" folder regardless of content
thanks & i'll apply for a false positive excemption.
- « Previous
-
- 1
- 2
- Next »
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The ASV scanning vendor has marked this as a false positive.

- « Previous
-
- 1
- 2
- Next »