First published: Tue Jun 11 2024(Updated: )
An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS and FortiProxy reboot page may allow a remote privileged attacker with super-admin access to execute JavaScript code via crafted HTTP GET requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | >=7.4.0<=7.4.3 | |
Fortinet FortiOS IPS Engine | >=7.2.0<=7.2.7 | |
Fortinet FortiOS IPS Engine | >=7.0.0<=7.0.13 | |
Fortinet FortiProxy | >=7.4.0<=7.4.2 | |
Fortinet FortiProxy | >=7.2.0<=7.2.8 | |
Fortinet FortiProxy | >=7.0.0<=7.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-23-471 vulnerability is classified as a high severity security risk due to the potential for remote code execution.
To remediate FG-IR-23-471, upgrade FortiOS to version 7.4.4 or higher, FortiOS 7.2.8 or higher, or FortiOS 7.0.14 or higher, as applicable.
FG-IR-23-471 affects FortiOS and FortiProxy versions 7.4.0 to 7.4.3, 7.2.0 to 7.2.7, and 7.0.0 to 7.0.13.
FG-IR-23-471 can enable an attacker with super-admin access to execute arbitrary JavaScript code on the targeted web page.
The FG-IR-23-471 vulnerability is a Cross-site Scripting (XSS) issue caused by improper neutralization of input during web page generation.