CVE-2021-43206Information Exposure via Error Message in Fortinet Fortios

Severity
4.3MEDIUMNVD
EPSS
0.4%
top 39.86%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 4
Latest updateMay 5

Description

A server-generated error message containing sensitive information in Fortinet FortiOS 7.0.0 through 7.0.3, 6.4.0 through 6.4.8, 6.2.x, 6.0.x and FortiProxy 7.0.0 through 7.0.1, 2.0.x allows malicious webservers to retrieve a web proxy's client username and IP via same origin HTTP requests triggering proxy-generated HTTP status codes pages.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages2 packages

NVDfortinet/fortiproxy2.0.02.0.9+1
NVDfortinet/fortios5.6.06.0.14+3

🔴Vulnerability Details

2
GHSA
GHSA-9645-9xqx-6r37: A server-generated error message containing sensitive information in Fortinet FortiOS 72022-05-05
CVEList
CVE-2021-43206: A server-generated error message containing sensitive information in Fortinet FortiOS 72022-05-04

📋Vendor Advisories

1
Fortinet
Information disclosure in web proxy error pages2022-05-04
CVE-2021-43206 — Information Exposure via Error Message | cvebase