First published: Tue Sep 07 2021(Updated: )
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiOS 6.4.1 and below, 6.2.9 and below may allow a remote unauthenticated attacker to either redirect users to malicious websites via a crafted "Host" header or to execute JavaScript code in the victim's browser context. This happens when the FortiGate has web filtering and category override enabled/configured.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | <6.4.1<6.2.9 |
Please upgrade to FortiOS version 6.4.2 or above. Please upgrade to FortiOS version 6.2.10 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16151 is classified as a medium severity vulnerability due to its potential to allow exploitation by remote unauthenticated attackers.
CVE-2019-16151 can allow attackers to redirect users to malicious websites or execute arbitrary JavaScript code.
CVE-2019-16151 affects FortiOS versions 6.4.1 and below, and 6.2.9 and below.
To mitigate CVE-2019-16151, upgrade FortiOS to the latest version that addresses this vulnerability.
No, CVE-2019-16151 can be exploited by remote unauthenticated attackers.