- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
vulnerabilities - Predictable Resource Location Via Forced Browsing
The security team picked up the below scan on the external firewall which the IP is the SSL vpn used by us.
The ASV scans shows the web directory is accessible via this URL https://x.x.x.x/images/. when I tried to access it from a public network, it redirects me to SSL VPN web portal login page. https://x.x.x.x/remote/login?lang=en
Previously article that I looked at
SSL-VPN Connection Attempts - Fortinet Community
We want this vulnerabilities to be removed regardless of locations, is there any way we can to disable this file directory/subfolder without impacting the SSL VPN?
Appreciate your feedback. TIA :)
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If you are not using sslvpn web mode, you can disable it using this article https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-SSL-VPN-Web-Mode-or-Tunnel-...
2. You can also restrict the access to the sslvpn portal via local in policy . Please check this link
