First published: Wed Dec 08 2021(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiWeb version 6.4.1 and 6.4.0, version 6.3.15 and below, version 6.2.6 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.2.0<=6.2.6 | |
Fortinet FortiWeb | >=6.3.0<=6.3.15 | |
Fortinet FortiWeb | =6.4.0 | |
Fortinet FortiWeb | =6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2021-43063.
The severity level of CVE-2021-43063 is medium (6.1).
Fortinet FortiWeb versions 6.4.1, 6.4.0, 6.3.15 and below, 6.2.6 and below are affected by CVE-2021-43063.
CVE-2021-43063 allows an attacker to execute unauthorized code or commands via crafted HTTP GET requests to the login webpage.
To mitigate CVE-2021-43063, it is recommended to update Fortinet FortiWeb to a version that is not affected by the vulnerability.