CVE-2024-45327: Design weakness on FortiSOAR! (12th Sep 2024)

Preface: In session hijacking, an attacker gets hold of a valid user session to gain unauthorized access to the account. This is typically done through three methods:

Brute force: The attacker keeps trying session IDs until they are successful.

Calculation: If the session IDs are generated in a non-random manner, the attacker can calculate them.

Theft: The attacker acquires the session ID through techniques like session sniffing, session fixation, and cross-site scripting.

Background: FortiSOAR helps IT/OT security teams thwart attacks by centralizing incident management and automating the myriad of analyst activities required for effective threat investigation and response.

Vulnerability details: An improper authorization vulnerability [CWE-285] in FortiSOAR version 7.4.0 through 7.4.3, 7.3.0 through 7.3.2, 7.2.0 through 7.2.2, 7.0.0 through 7.0.3 change password endpoint may allow an authenticated attacker to perform a brute force attack on users and administrators password via crafted HTTP requests.

Official announcement: Please refer to the vendor announcement for details –

https://fortiguard.fortinet.com/psirt/FG-IR-24-048

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.