var-202001-0176
Vulnerability from variot
An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code. FortiSIEM Contains a vulnerability related to insufficient protection of credentials.Information may be obtained. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. An information disclosure vulnerability exists in Fortinet FortiSIEM 5.2.2 and earlier versions. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-0176", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fortisiem", "scope": "lt", "trust": 1.0, "vendor": "fortinet", "version": "5.2.5" }, { "model": "fortisiem", "scope": "lte", "trust": 0.8, "vendor": "fortinet", "version": "5.2.2" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.1.1" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "4.10.0" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.2.0" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.0.1" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.1.2" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.2.1" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.0.0" }, { "model": "fortisiem", "scope": "eq", "trust": 0.6, "vendor": "fortinet", "version": "5.1.0" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "CNNVD", "id": "CNNVD-201910-519" }, { "db": "NVD", "id": "CVE-2019-6700" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:fortinet:fortisiem", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013880" } ] }, "cve": "CVE-2019-6700", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "CVE-2019-6700", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "id": "VHN-158135", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2019-6700", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-6700", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2019-6700", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2019-6700", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201910-519", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-158135", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-158135" }, { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "CNNVD", "id": "CNNVD-201910-519" }, { "db": "NVD", "id": "CVE-2019-6700" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An information exposure vulnerability in the external authentication profile form of FortiSIEM 5.2.2 and earlier may allow an authenticated attacker to retrieve the external authentication password via the HTML source code. FortiSIEM Contains a vulnerability related to insufficient protection of credentials.Information may be obtained. Fortinet FortiSIEM is a security information and event management system developed by Fortinet Corporation. The system includes features such as asset discovery, workflow automation and unified management. An information disclosure vulnerability exists in Fortinet FortiSIEM 5.2.2 and earlier versions. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components", "sources": [ { "db": "NVD", "id": "CVE-2019-6700" }, { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "VULHUB", "id": "VHN-158135" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-6700", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2019-013880", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201910-519", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.3781", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2020-04291", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-158135", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158135" }, { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "CNNVD", "id": "CNNVD-201910-519" }, { "db": "NVD", "id": "CVE-2019-6700" } ] }, "id": "VAR-202001-0176", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-158135" } ], "trust": 0.01 }, "last_update_date": "2024-11-23T22:51:32.055000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "FG-IR-19-100", "trust": 0.8, "url": "https://fortiguard.com/psirt/FG-IR-19-100" }, { "title": "Fortinet FortiSIEM Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99167" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "CNNVD", "id": "CNNVD-201910-519" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-522", "trust": 1.9 }, { "problemtype": "CWE-200", "trust": 1.0 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158135" }, { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "NVD", "id": "CVE-2019-6700" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://fortiguard.com/advisory/fg-ir-19-100" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6700" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-6700" }, { "trust": 0.6, "url": "https://fortiguard.com/psirt/fg-ir-19-100" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.3781/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-158135" }, { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "CNNVD", "id": "CNNVD-201910-519" }, { "db": "NVD", "id": "CVE-2019-6700" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-158135" }, { "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "db": "CNNVD", "id": "CNNVD-201910-519" }, { "db": "NVD", "id": "CVE-2019-6700" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-07T00:00:00", "db": "VULHUB", "id": "VHN-158135" }, { "date": "2020-01-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "date": "2019-10-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-519" }, { "date": "2020-01-07T19:15:10.993000", "db": "NVD", "id": "CVE-2019-6700" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-01-08T00:00:00", "db": "VULHUB", "id": "VHN-158135" }, { "date": "2020-01-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-013880" }, { "date": "2020-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201910-519" }, { "date": "2024-11-21T04:46:58.753000", "db": "NVD", "id": "CVE-2019-6700" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-519" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "FortiSIEM Vulnerable to insufficient protection of credentials", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-013880" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201910-519" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.