First published: Fri Oct 13 2023(Updated: )
An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.0 and 4.2.0 through 4.2.4, and 4.0.0 through 4.0.4 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.4 through 3.0.7 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=3.0.4<=3.0.7 | |
Fortinet FortiSandbox | >=3.1.0<=3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<=3.2.4 | |
Fortinet FortiSandbox | >=4.0.0<=4.0.4 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.4 | |
Fortinet FortiSandbox | =4.4.0 |
Please upgrade to FortiSandbox version 4.4.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41836 is a vulnerability in Fortinet FortiSandbox that allows attackers to execute unauthorized code or commands through cross-site scripting.
CVE-2023-41836 has a severity level of 6.1, which is considered medium.
Fortinet FortiSandbox versions 4.4.0, 4.2.0 through 4.2.4, 4.0.0 through 4.0.4, 3.2.0 through 3.2.4, 3.1.0 through 3.1.5, and 3.0.4 through 3.0.7 are affected by CVE-2023-41836.
CVE-2023-41836 occurs due to an improper neutralization of input during web page generation, specifically a cross-site scripting vulnerability.
To fix CVE-2023-41836, it is recommended to upgrade to a version of Fortinet FortiSandbox that is not affected by the vulnerability.