First published: Tue Apr 11 2023(Updated: )
An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiADC version 7.1.1 and below, version 7.0.3 and below, version 6.2.5 and below may allow an authenticated attacker to perform a cross-site scripting attack via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=6.2.0<6.2.6 | |
Fortinet FortiADC | >=7.0.0<7.0.4 | |
Fortinet FortiADC | >=7.1.0<7.1.2 |
Please upgrade to FortiADC version 7.1.2 or above Please upgrade to FortiADC version 7.0.4 or above Please upgrade to FortiADC version 6.2.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43952 is an improper neutralization of input during web page generation (Cross-site Scripting) vulnerability in FortiADC versions 7.1.1 and below, 7.0.3 and below, and 6.2.5 and below.
CVE-2022-43952 may allow an authenticated attacker to perform a cross-site scripting attack via crafted HTTP requests on FortiADC versions 7.1.1 and below, 7.0.3 and below, and 6.2.5 and below.
CVE-2022-43952 has a severity score of 5.4 (medium).
To fix CVE-2022-43952, it is recommended to upgrade FortiADC to version 7.1.2, 7.0.4, or 6.2.6 depending on the affected version.
You can find more information about CVE-2022-43952 at [FortiGuard Advisory FG-IR-22-439](https://fortiguard.com/psirt/FG-IR-22-439).