First published: Wed Sep 13 2023(Updated: )
An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS and FortiProxy GUI may allow an authenticated attacker to trigger malicious JavaScript code execution via crafted guest management setting.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiProxy | >=7.0.0<7.0.11 | |
Fortinet FortiProxy | >=7.2.0<7.2.5 | |
Fortinet FortiOS | >=6.2.0<6.2.15 | |
Fortinet FortiOS | >=6.4.0<6.4.13 | |
Fortinet FortiOS | >=7.0.0<7.0.12 | |
Fortinet FortiOS | >=7.2.0<7.2.5 | |
Fortinet FortiOS | >=7.2.0<=7.2.4 | |
Fortinet FortiOS | >=7.0.0<=7.0.11 | |
Fortinet FortiOS | >=6.4.0<=6.4.12 | |
Fortinet FortiOS | >=6.2.0<=6.2.14 | |
Fortinet FortiProxy | >=7.2.0<=7.2.4 | |
Fortinet FortiProxy | >=7.0.0<=7.0.10 |
Please upgrade to FortiProxy version 7.2.5 or above Please upgrade to FortiProxy version 7.0.11 or above Please upgrade to FortiOS version 7.4.0 or above Please upgrade to FortiOS version 7.2.5 or above Please upgrade to FortiOS version 7.0.12 or above Please upgrade to FortiOS version 6.4.13 or above Please upgrade to FortiOS version 6.2.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security issue is CVE-2023-29183.
The severity of CVE-2023-29183 is high.
FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, and FortiOS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.13, and 6.2.0 through 6.2.15 are affected by CVE-2023-29183.
The CWE-ID associated with CVE-2023-29183 is CWE-79.
To fix the CVE-2023-29183 vulnerability, it is recommended to update FortiProxy and FortiOS to the latest versions available, as the issue has been patched in later releases.