First published: Fri Oct 13 2023(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=2.5.0<=2.5.2 | |
Fortinet FortiSandbox | >=3.0.0<=3.0.7 | |
Fortinet FortiSandbox | >=3.1.0<=3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<=3.2.4 | |
Fortinet FortiSandbox | >=4.0.0<=4.0.3 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.5 | |
Fortinet FortiSandbox | =2.4.1 |
Please upgrade to FortiSandbox version 4.4.2 or above Please upgrade to FortiSandbox version 4.2.6 or above Please upgrade to FortiSandbox version 4.0.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-41680 is high with a CVSS score of 6.1.
CVE-2023-41680 allows attackers to perform cross-site scripting (XSS) attacks on Fortinet FortiSandbox versions 2.4.1 to 4.4.1.
Yes, CVE-2023-41680 can be exploited remotely.
Yes, Fortinet has released a security advisory with a fix for CVE-2023-41680. It is recommended to update to the latest version of Fortinet FortiSandbox.
More information about CVE-2023-41680 can be found at the Fortinet FortiGuard website.