First published: Tue Apr 11 2023(Updated: )
An improper neutralization of input during web page generation [CWE-79] in the FortiWeb web interface 7.0.0 through 7.0.3, 6.3.0 through 6.3.21, 6.4 all versions, 6.2 all versions, 6.1 all versions and 6.0 all versions may allow an unauthenticated and remote attacker to perform a reflected cross site scripting attack (XSS) via injecting malicious payload in log entries used to build report.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.0.0<=6.2.7 | |
Fortinet FortiWeb | >=6.3.0<6.3.22 | |
Fortinet FortiWeb | >=6.4.0<=6.4.2 | |
Fortinet FortiWeb | >=7.0.0<7.0.4 |
Please upgrade to FortiWeb version 7.2.0 or above Please upgrade to FortiWeb version 7.0.4 or above Please upgrade to FortiWeb version 6.3.22 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-43955 is a vulnerability in the FortiWeb web interface that allows an unauthenticated remote attacker to perform a reflected cross-site scripting attack.
The severity of CVE-2022-43955 is high with a CVSS score of 6.1.
FortiWeb versions 6.0.0 to 6.2.7, 6.3.0 to 6.3.21, 6.4.0 to 6.4.2, and 7.0.0 to 7.0.3 are affected by CVE-2022-43955.
An attacker can exploit CVE-2022-43955 by tricking a user into clicking on a specially crafted link that contains malicious code, which is then executed in the victim's browser.
Yes, Fortinet has released patches to fix the vulnerability. It is recommended to update to the latest version of FortiWeb to mitigate the risk.