First published: Fri Oct 13 2023(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=2.5.0<=2.5.2 | |
Fortinet FortiSandbox | >=3.0.0<=3.0.7 | |
Fortinet FortiSandbox | >=3.1.0<=3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<=3.2.4 | |
Fortinet FortiSandbox | >=4.0.0<=4.0.3 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.5 | |
Fortinet FortiSandbox | =2.4.1 |
Please upgrade to FortiSandbox version 4.4.2 or above Please upgrade to FortiSandbox version 4.2.6 or above Please upgrade to FortiSandbox version 4.0.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-41681 is high with a CVSS score of 6.1.
CVE-2023-41681 affects Fortinet FortiSandbox versions 2.4.1 through 4.4.1.
CVE-2023-41681 is a vulnerability related to improper neutralization of input during web page generation (cross-site scripting) in Fortinet FortiSandbox.
Yes, Fortinet has released a fix for CVE-2023-41681. Please refer to the official Fortinet advisory for more information.
You can find more information about CVE-2023-41681 in the FortiGuard advisory: https://fortiguard.com/psirt/FG-IR-23-311.