First published: Thu May 26 2016(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface (WebUI) in Fortinet FortiSandbox before 2.1 allow remote attackers to inject arbitrary web script or HTML via the (1) serial parameter to alerts/summary/profile/; the (2) urlForCreatingReport parameter to csearch/report/export/; the (3) id parameter to analysis/detail/download/screenshot; or vectors related to (4) "Fortiview threats by users search filtered by vdom" or (5) "PCAP file download generated by the VM scan feature."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | ||
Fortinet FortiSandbox Firmware | <=2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7360 is categorized as a medium severity vulnerability due to its potential for remote exploitation.
To fix CVE-2015-7360, upgrade Fortinet FortiSandbox to version 2.1 or later to address the cross-site scripting vulnerabilities.
CVE-2015-7360 affects Fortinet FortiSandbox prior to version 2.1, specifically those running firmware versions up to and including 2.0.4.
Yes, CVE-2015-7360 can be exploited remotely, allowing attackers to inject malicious scripts into the Web User Interface.
With CVE-2015-7360, attackers can perform cross-site scripting (XSS) attacks, potentially compromising user sessions or stealing sensitive information.