First published: Fri Oct 13 2023(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=2.5.0<=2.5.2 | |
Fortinet FortiSandbox | >=3.0.0<=3.0.7 | |
Fortinet FortiSandbox | >=3.1.0<=3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<=3.2.4 | |
Fortinet FortiSandbox | >=4.0.0<=4.0.3 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.5 | |
Fortinet FortiSandbox | =2.4.1 |
Please upgrade to FortiSandbox version 4.4.2 or above Please upgrade to FortiSandbox version 4.2.6 or above Please upgrade to FortiSandbox version 4.0.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-41843 is high.
CVE-2023-41843 affects Fortinet FortiSandbox versions 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3.
Yes, CVE-2023-41843 is a cross-site scripting vulnerability.
An attacker can exploit CVE-2023-41843 by executing unauthorized code or commands through crafted HTTP requests.
You can find more information about CVE-2023-41843 at the following URL: https://fortiguard.com/psirt/FG-IR-23-273