First published: Wed Dec 08 2021(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWLM version 8.6.1 and below allows attacker to store malicious javascript code in the device and trigger it via crafted HTTP requests
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLM | <=8.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41029 is a vulnerability in Fortinet FortiWLM version 8.6.1 and below that allows an attacker to store malicious JavaScript code in the device and trigger it via crafted HTTP requests.
CVE-2021-41029 affects Fortinet FortiWLM version 8.6.1 and below by enabling an attacker to store and execute malicious JavaScript code on the device.
The severity of CVE-2021-41029 is medium, with a severity value of 5.4 based on the CVSS (Common Vulnerability Scoring System) scale.
To fix CVE-2021-41029, update Fortinet FortiWLM to a version higher than 8.6.1, as the vulnerability has been patched in newer versions.
You can find more information about CVE-2021-41029 in the FortiGuard advisory FG-IR-21-114, available at the following link: https://fortiguard.com/advisory/FG-IR-21-114