Skip to content

Fortinet FortiNAC - improper permissions set for tomcat users configuration file (CVE-2021-43065)

Moderate
orange-cert-cc published GHSA-8wx4-g5p9-348h Dec 8, 2021

Package

FortiNAC (Fortinet)

Affected versions

9.1

Patched versions

9.1.4

Description

Overview

An unprivileged user can read the login and the password of the FortiNAC Configuration Wizard stored in cleartext
in a tomcat configuration file and then gaining access to it.

Impact

This incorrect permission assignment for a critical resource vulnerability may allow an authenticated attacker to access sensitive system data and, as a consequence, raise the authenticated user's privilege to admin.

Details

An unprivileged ssh user can read the login and the password of the FortiNAC Configuration Wizard (https://<FortiNAC IP Address>:8443/configWizard) stored in cleartext in a tomcat configuration file and then gaining access to it.
Once connected, the attacker can change parameters which could lead to a denial of service or change the config password to prevent an administrator to gain back access to this section.

Proof of Concept

In a CLI SSH session with an unprivileged user, just read the /bsc/services/tomcat-admin/conf/tomcat-users.xml file and connect with a browser to the configWizard.

Solution

Security patch

  • Upgrade to upcoming FortiNAC version 10.0.0 or above.
  • Upgrade to FortiNAC version 9.2.1 or above.
  • Upgrade to FortiNAC version 9.1.4 or above.
  • Upgrade to FortiNAC version 8.8.10 or above.

Workaround

There are no workarounds that address this vulnerability.

References

https://www.fortiguard.com/psirt/FG-IR-21-178
https://nvd.nist.gov/vuln/detail/CVE-2021-43065

Credits

Orange CERT-CC
Valentin ALLAIRE at Orange group

Timeline

Date reported: September 22, 2021
Date fixed: December 7, 2021

Severity

Moderate
5.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

CVE ID

CVE-2021-43065

Weaknesses