First published: Tue Jun 11 2024(Updated: )
An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS and FortiProxy reboot page may allow a remote privileged attacker with super-admin access to execute JavaScript code via crafted HTTP GET requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.13 | |
Fortinet FortiProxy | >=7.4.0<=7.4.2 | |
Fortinet FortiProxy | >=7.2.0<=7.2.8 | |
Fortinet FortiProxy | >=7.0.0<=7.0.14 | |
Fortinet FortiProxy | >=7.0.0<7.0.15 | |
Fortinet FortiProxy | >=7.2.0<7.2.9 | |
Fortinet FortiProxy | >=7.4.0<7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.0.0<7.0.14 | |
Fortinet FortiOS IPS Engine | >=7.2.0<7.2.8 | |
Fortinet FortiOS IPS Engine | >=7.4.0<7.4.4 |
Please upgrade to FortiOS version 7.4.4 or above Please upgrade to FortiOS version 7.2.8 or above Please upgrade to FortiOS version 7.0.14 or above Please upgrade to FortiProxy version 7.4.3 or above Please upgrade to FortiProxy version 7.2.9 or above Please upgrade to FortiProxy version 7.0.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23111 is categorized as a high severity vulnerability due to the potential for remote code execution by privileged attackers.
To fix CVE-2024-23111, upgrade FortiOS to version 7.4.4 or higher, 7.2.8 or higher, or 7.0.14 or higher, or update FortiProxy to version 7.4.3 or higher, 7.2.9 or higher, or 7.0.15 or higher.
CVE-2024-23111 affects FortiOS versions 7.4.0 to 7.4.3, 7.2.0 to 7.2.7, and 7.0.0 to 7.0.13, as well as FortiProxy versions 7.4.0 to 7.4.2, 7.2.0 to 7.2.8, and 7.0.0 to 7.0.14.
CVE-2024-23111 can be exploited through crafted HTTP GET requests, allowing attackers to execute arbitrary JavaScript in the context of an affected web page.
CVE-2024-23111 can be exploited by remote attackers with super-admin access to the affected FortiOS or FortiProxy devices.