- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Clarity on PSIRT Advisory FG-IR-23-120
I am seeking clarity on this advisory.
A use of GET request method with sensitive query strings vulnerability [CWE-598] in the FortiOS SSL VPN component may allow an attacker to view plaintext passwords of remote services such as RDP or VNC, if the attacker is able to read the GET requests to those services (found in logs, referers, caches, etc...)
We have several employees who SSLVPN using the FortiGate VPN client. They then RDP to a Windows VM server. In this instances how can an attacker view the plaintext passwords using the GET request? As I understand a GET request is an http request and RDP uses protocol 3389. Fortinet Support was not helpful in explaining the logic behind the advisory. Can someone help me understand how an attacker can do this?
Solved! Go to Solution.
- Labels:
-
Customer Service
-
FortiClient
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That is correct.
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
you can disable the webmode as explained in https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-SSL-VPN-Web-Mode-or-Tunnel-...
In this example SSL-VPN Mode portal.
# config vpn ssl web portal
edit "SSLVPN Mode"
set web-mode disable <----- Unset web-mode.
end
end
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When you say "FortiGate VPN client", do you mean they use FortiClient to connect to SSL VPN? If so, you are not affected by this vulnerability. This vulnerability only affects web-mode not tunnel mode.
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi Suraj,
Thank you for clarifying. So this vulnerability only affects if you are using the Browser to sslvpn in correct?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That is correct.
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is there a way to block sslvpn through the browser from the Fortigate?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
you can disable the webmode as explained in https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-disable-SSL-VPN-Web-Mode-or-Tunnel-...
In this example SSL-VPN Mode portal.
# config vpn ssl web portal
edit "SSLVPN Mode"
set web-mode disable <----- Unset web-mode.
end
end
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
