First published: Wed Oct 06 2021(Updated: )
An improper neutralization of input vulnerability [CWE-79] in FortiWebManager versions 6.2.3 and below, 6.0.2 and below may allow a remote authenticated attacker to inject malicious script/tags via the name/description/comments parameter of various sections of the device.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.0.0<6.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36175 has been classified as a medium severity vulnerability due to its potential for script injection.
To fix CVE-2021-36175, update FortiWebManager to versions 6.2.4 or later, or 6.0.3 or later.
CVE-2021-36175 affects FortiWebManager versions 6.2.3 and below, as well as 6.0.2 and below.
CVE-2021-36175 allows a remote authenticated attacker to perform script injection through the name, description, or comments parameters.
CVE-2021-36175 is categorized as an improper neutralization of input vulnerability, which falls under CWE-79.