First published: Thu Jun 01 2017(Updated: )
A Cross-Site Scripting vulnerability in Fortinet FortiGate 5.2.0 through 5.2.10 allows attacker to execute unauthorized code or commands via the srcintf parameter during Firewall Policy Creation.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | =5.2.0 | |
Fortinet FortiOS | =5.2.1 | |
Fortinet FortiOS | =5.2.2 | |
Fortinet FortiOS | =5.2.3 | |
Fortinet FortiOS | =5.2.4 | |
Fortinet FortiOS | =5.2.5 | |
Fortinet FortiOS | =5.2.6 | |
Fortinet FortiOS | =5.2.7 | |
Fortinet FortiOS | =5.2.8 | |
Fortinet FortiOS | =5.2.9 | |
Fortinet FortiOS | =5.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3127 is considered a high severity vulnerability due to its potential for remote code execution through Cross-Site Scripting.
To remediate CVE-2017-3127, upgrade Fortinet FortiGate to version 5.2.11 or later as per the recommended security updates.
CVE-2017-3127 affects Fortinet FortiGate versions 5.2.0 through 5.2.10.
Yes, CVE-2017-3127 can be exploited remotely by an attacker to execute unauthorized commands.
CVE-2017-3127 is a Cross-Site Scripting (XSS) vulnerability allowing execution of scripts in the user's browser.