Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-3978

EPSS 5.44% · P90
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-3978

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the "redirect" parameter to "login."
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Fortinet FortiOS Web User Interface 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Fortinet FortiOS是美国飞塔(Fortinet)公司开发的一套专用于FortiGate网络安全平台上的安全操作系统。该系统为用户提供防火墙、防病毒、IPSec/SSL VPN、Web内容过滤和反垃圾邮件等多种安全功能。 Fortinet FortiOS的Web User Interface(WebUI)中存在安全漏洞。远程攻击者可借助登录时的‘redirect’参数利用该漏洞将用户重定向到任意Web站点,实施钓鱼攻击或跨站脚本攻击。以下版本受到影响:Fortinet FortiOS 5.0.
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-3978

#POC DescriptionSource LinkShenlong Link
1FortiOS Web User Interface in 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting attacks via the "redirect" parameter to "login."https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-3978.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-3978

Please Login to view more intelligence information

Same Patch Batch · n/a · 2016-04-08 · 31 CVEs total

CVE-2016-2512Django‘django.utils.http.is_safe_url()’安全绕过漏洞
CVE-2015-8840SAP NetWeaver AS Java XML Data Archiving Service服务安全漏洞
CVE-2016-3980SAP NetWeaver AS JAVA Java Startup Framework组件拒绝服务漏洞
CVE-2016-3979SAP NetWeaver AS JAVA Internet Communication Manager组件拒绝服务漏洞
CVE-2016-3188Drupal Prepopulate模块安全漏洞
CVE-2016-3187Drupal Prepopulate模块安全漏洞
CVE-2016-3154SPIP 代码注入漏洞
CVE-2016-3153SPIP 代码注入漏洞
CVE-2016-2324Git‘path_name()’整数溢出漏洞
CVE-2016-2315Git‘path_name()’安全漏洞
CVE-2015-6541Zimbra Collaboration Server Mail接口跨站请求伪造漏洞
CVE-2016-3984多款McAfee产品安全漏洞
CVE-2016-3983McAfee Advanced Threat Defense 安全漏洞
CVE-2016-3963Siemens SCALANCE S613 拒绝服务漏洞
CVE-2016-2513Django 安全漏洞
CVE-2015-5158QEMU 基于栈的缓冲区溢出漏洞
CVE-2016-2381Perl 输入验证错误漏洞
CVE-2016-1375Cisco IP Interoperability and Collaboration System 跨站脚本漏洞
CVE-2016-1180LOCKON EC-CUBE Social-button Premium插件跨站脚本漏洞
CVE-2015-5969Novell openSUSE mysql-community-server和mariadb 安全漏洞

Showing top 20 of 31 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-3978

No comments yet


Leave a comment