First published: Wed Sep 13 2023(Updated: )
An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS and FortiProxy GUI may allow an authenticated attacker to trigger malicious JavaScript code execution via crafted guest management setting.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.4 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.11 | |
Fortinet FortiOS IPS Engine | >=6.4.0<=6.4.12 | |
Fortinet FortiOS IPS Engine | >=6.2.0<=6.2.14 | |
Fortinet FortiProxy | >=7.2.0<=7.2.4 | |
Fortinet FortiProxy | >=7.0.0<=7.0.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-23-106 vulnerability is classified as a moderate severity Cross-site Scripting (XSS) issue.
To fix FG-IR-23-106, upgrade FortiOS or FortiProxy to the specified remedial versions: FortiOS 7.2.5, 7.0.12, 6.4.13, 6.2.15, or FortiProxy 7.2.5 and 7.0.11.
FG-IR-23-106 affects FortiOS versions from 6.2.0 to 7.2.4 and FortiProxy versions from 7.0.0 to 7.2.4.
The systems impacted by FG-IR-23-106 include FortiOS and FortiProxy web GUI interfaces.
An authenticated attacker can exploit FG-IR-23-106 to execute malicious JavaScript code through crafted guest management settings.