First published: Tue Dec 06 2022(Updated: )
Improper neutralization of input during web page generation [CWE-79] in FortiSOAR 7.0.0 through 7.0.3 and 7.2.0 may allow an authenticated attacker to inject HTML tags via input fields of various components within FortiSOAR.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSOAR Imap Connector | >=7.0.0<=7.0.3 | |
Fortinet FortiSOAR Imap Connector | =7.2.0 |
Please upgrade to FortiSOAR version 7.2.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-38379 has a medium severity rating due to the potential for HTML injection attacks.
You can remediate CVE-2022-38379 by upgrading FortiSOAR to version 7.0.4 or later.
CVE-2022-38379 affects FortiSOAR versions 7.0.0 through 7.0.3 and version 7.2.0.
CVE-2022-38379 requires authenticated access, meaning exploitation is not possible remotely without user credentials.
CVE-2022-38379 is classified as an improper neutralization of input during web page generation, specifically allowing HTML injection.