-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2016.2340
 FortiAnalyzer and FortiManager stored XSS vulnerability in report filters
                              6 October 2016

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Fortinet FortiAnalyzer and FortiManager
Publisher:         Fortiguard
Operating System:  Network Appliance
Impact/Access:     Cross-site Scripting -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2015-7363  

Original Bulletin: 
   http://fortiguard.com/advisory/fortianalyzer-and-fortimanager-stored-xss-vulnerability-in-report-filters

- --------------------------BEGIN INCLUDED TEXT--------------------

FortiAnalyzer and FortiManager stored XSS vulnerability in report filters

Info

Risk

2 Low

Date

Oct 05 2016

Impact

Access to another privileged administrator user's data

CVE ID

CVE-2015-7363

Fixed In Firmware

5.0.13,5.2.3,5.4.0

A cross-site-scripting vulnerablity in FortiAnalyzer/FortiManager in advanced
settings page could allow an administrator to inject scripts in the add filter
field.

Impact

Access to another privileged administrator user's data

Affected Products

FortiManager: 5.0.0 - 5.0.11, 5.2.0 - 5.2.2

FortiAnalyzer: 5.0.0 - 5.0.12, 5.2.0 - 5.2.2

Risk

2 Low

Solutions

Upgrade to:

FortiManager

5.0.12 and above

5.2.3 and above

5.4.0 and above

FortiAnalyzer

5.0.13 and above

5.2.3 and above

5.4.0 and above

FortiManager hardware models without hard disk are not affected.

This feature is disabled by default in all FortiManager versions.

Acknowledgement

Fortinet is pleased to thank Ismail Saygili for reporting a 
FortiManager/FortiAnalyzer vulnerability under responsible disclosure.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=+UVR
-----END PGP SIGNATURE-----