First published: Tue Jun 01 2021(Updated: )
Failure to sanitize input in the SSL VPN web portal may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=1.2.0<=1.2.9 | |
Fortinet FortiProxy | =2.0.0 | |
Fortinet FortiProxy | =2.0.1 | |
Fortinet FortiOS | >=5.2.10<=5.2.15 | |
Fortinet FortiOS | >=5.4.0<=5.4.13 | |
Fortinet FortiOS | >=5.6.0<=5.6.14 | |
Fortinet FortiOS | >=6.0.0<=6.0.12 | |
Fortinet FortiOS | >=6.2.0<=6.2.7 | |
Fortinet FortiOS | >=6.4.0<=6.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-26092 is medium.
The affected software for CVE-2021-26092 includes FortiOS versions 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, and 6.4.0 through 6.4.4, as well as FortiProxy versions 1.2.0 through 1.2.9 and 2.0.0 through 2.0.1.
CVE-2021-26092 affects FortiOS by failing to sanitize input in the SSL VPN web portal, which may allow a remote unauthenticated attacker to perform malicious actions.
CVE-2021-26092 affects FortiProxy by failing to sanitize input in the SSL VPN web portal, which may allow a remote unauthenticated attacker to perform malicious actions.
To fix CVE-2021-26092, it is recommended to update FortiOS and FortiProxy to the latest patched versions provided by Fortinet.