CVE-2024-46671

6.2 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers with read-only admin permissions in FortiWeb to manipulate other administrators' dashboard widgets via specially crafted requests. It affects FortiWeb versions 7.6.2 and below, 7.4.6 and below, 7.2.10 and below, and 7.0.11 and below. The issue stems from incorrect user management controls in the dashboard widget functionality.

💻 Affected Systems

Products:
  • FortiWeb Web Application Firewall
Versions: 7.6.2 and below, 7.4.6 and below, 7.2.10 and below, 7.0.11 and below
Operating Systems: FortiWeb OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all configurations where dashboard widgets are enabled. Requires authenticated user with at least read-only admin permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could modify or delete dashboard widgets of other administrators, potentially disrupting monitoring capabilities or hiding security alerts from legitimate administrators.

🟠

Likely Case

Attackers with read-only access could tamper with dashboard configurations, causing confusion or operational disruption by altering how security data is displayed to other administrators.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to dashboard widget manipulation without compromising core security functions or data.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing FortiWeb instances could be targeted by attackers who have obtained or guessed admin credentials.
🏢 Internal Only: HIGH - Internal attackers with legitimate read-only admin access could exploit this to disrupt security monitoring and create confusion among security teams.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with admin privileges. Crafted HTTP requests to dashboard widget endpoints are needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.3, 7.4.7, 7.2.11, 7.0.12

Vendor Advisory: https://fortiguard.fortinet.com/psirt/FG-IR-24-184

Restart Required: Yes

Instructions:

1. Download the appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update via FortiWeb web interface or CLI. 4. Reboot the device after installation completes.

🔧 Temporary Workarounds

Restrict Admin Access

all

Limit the number of users with admin permissions and implement strict access controls.

Monitor Dashboard Changes

all

Implement logging and alerting for dashboard widget modifications.

🧯 If You Can't Patch

  • Implement strict principle of least privilege for admin accounts
  • Enable detailed logging of dashboard activities and monitor for suspicious widget modifications

🔍 How to Verify

Check if Vulnerable:

Check FortiWeb version via web interface (System > Status) or CLI command 'get system status'

Check Version:

get system status | grep Version

Verify Fix Applied:

Verify version is 7.6.3, 7.4.7, 7.2.11, or 7.0.12 or higher after patching

📡 Detection & Monitoring

Log Indicators:

  • Unusual dashboard widget modifications by read-only admin users
  • Multiple failed authentication attempts followed by successful admin login

Network Indicators:

  • HTTP POST requests to dashboard widget endpoints from unexpected sources
  • Unusual patterns in admin interface access

SIEM Query:

source="fortiweb" AND (event_type="dashboard_modification" OR action="widget_change") AND user_role="read-only-admin"

🔗 References

📤 Share & Export