First published: Wed Jan 15 2025(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiDeceptor 3.x all versions, 4.x all versions, 5.0 all versions, 5.1 all versions, version 5.2.0, and version 5.3.0 may allow an attacker to perform a reflected cross-site scripting attack in the recovery endpoints
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiDeceptor | <=3.x<=4.x<=5.0<=5.1 | |
Fortinet FortiDeceptor | >=3.0.0<5.2.1 | |
Fortinet FortiDeceptor | =5.3.0 |
Please upgrade to FortiDeceptor version 6.0.0 or above Please upgrade to FortiDeceptor version 5.3.1 or above Please upgrade to FortiDeceptor version 5.2.1 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35280 is classified as a high severity vulnerability due to its potential impact on user data and security.
To fix CVE-2024-35280, update Fortinet FortiDeceptor to the latest version that contains the security patches.
CVE-2024-35280 affects all versions of Fortinet FortiDeceptor from 3.x to 5.3.0 inclusive.
CVE-2024-35280 is a cross-site scripting (XSS) vulnerability that allows for reflected attacks.
An attacker exploiting CVE-2024-35280 could execute malicious scripts in the context of users' browsers, potentially stealing sensitive information.