First published: Tue Aug 13 2024(Updated: )
An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSOAR 7.3.0 through 7.3.2 allows an authenticated, remote attacker to inject arbitrary web script or HTML via the Communications module.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSOAR Imap Connector | >=6.4.0<7.3.3 | |
Fortinet FortiSOAR Imap Connector | =7.4.0 |
Please upgrade to FortiSOAR version 7.5.0 or above Please upgrade to FortiSOAR version 7.4.1 or above Please upgrade to FortiSOAR version 7.3.3 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26211 has been rated as a high severity vulnerability due to its potential for exploitation in web applications.
To mitigate CVE-2023-26211, it is recommended to update Fortinet FortiSOAR to version 7.3.3 or later.
CVE-2023-26211 allows an attacker to execute arbitrary web scripts or HTML by exploiting cross-site scripting vulnerabilities.
CVE-2023-26211 affects users of Fortinet FortiSOAR versions 7.3.0 to 7.3.2 and version 7.4.0.
The Communications module of Fortinet FortiSOAR is specifically vulnerable in CVE-2023-26211.