First published: Wed Dec 08 2021(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted GET parameters in requests to login and error handlers
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.0.0<=6.2.5 | |
Fortinet FortiWeb | >=6.3.0<6.3.16 | |
Fortinet FortiWeb | >=6.4.0<6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36188 is a vulnerability that allows an attacker to execute unauthorized code or commands through crafted GET parameters in requests to login and error handlers in Fortinet FortiWeb versions 6.4.1 and below, 6.3.15 and below.
CVE-2021-36188 has a severity rating of 6.1 (medium).
Fortinet FortiWeb versions 6.4.1 and below, 6.3.15 and below are affected by CVE-2021-36188.
An attacker can exploit CVE-2021-36188 by sending crafted GET parameters in requests to login and error handlers in Fortinet FortiWeb.
To mitigate CVE-2021-36188, it is recommended to upgrade Fortinet FortiWeb to a version higher than 6.4.1 or 6.3.15, if available.