First published: Wed Dec 13 2023(Updated: )
An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 allows attacker to execute unauthorized code or commands via crafted HTTP requests
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=3.1.0<=3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<=3.2.4 | |
Fortinet FortiSandbox | >=4.0.0<=4.0.4 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.5 | |
Fortinet FortiSandbox | =4.4.0 | |
Fortinet FortiSandbox | =4.4.1 | |
Fortinet FortiSandbox | =4.4.2 |
Please upgrade to FortiSandbox version 4.4.3 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-45587 is categorized as critical, as it allows attackers to execute unauthorized code or commands.
To fix CVE-2023-45587, you should upgrade Fortinet FortiSandbox to the latest version available that addresses this vulnerability.
CVE-2023-45587 affects FortiSandbox versions 3.1.0 through 4.4.1.
CVE-2023-45587 is classified as a cross-site scripting (XSS) vulnerability due to improper neutralization of input during web page generation.
Yes, CVE-2023-45587 can lead to data breaches as it enables attackers to execute unauthorized actions that may compromise system security.