First published: Tue Nov 02 2021(Updated: )
An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiClient Enterprise Management Server | >=6.0.0<=6.0.8 | |
Fortinet FortiClient Enterprise Management Server | >=6.2.0<=6.2.9 | |
Fortinet FortiClient Enterprise Management Server | >=6.4.0<=6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15940 is an improper neutralization of input vulnerability in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below.
CVE-2020-15940 has a severity rating of 5.4 (medium).
CVE-2020-15940 allows a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server.
FortiClientEMS versions 6.4.1 and below and 6.2.9 and below are affected by CVE-2020-15940.
To fix CVE-2020-15940, update FortiClientEMS to a version above 6.4.1 or 6.2.9, respectively.