First published: Tue Jul 09 2024(Updated: )
An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS and FortiProxy's web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via social engineering the targeted user into bookmarking a malicious samba server, then opening the bookmark.
Affected Software | Affected Version | How to fix |
---|---|---|
FortiOS | >=7.4.0<=7.4.3 | |
FortiOS | >=7.2.0<=7.2.7 | |
FortiOS | >=7.0.0<=7.0.13 | |
FortiOS | >=6.4 | |
Fortinet FortiProxy SSL VPN webmode | >=7.4.0<=7.4.3 | |
Fortinet FortiProxy SSL VPN webmode | >=7.2.0<=7.2.9 | |
Fortinet FortiProxy SSL VPN webmode | >=7.0.0<=7.0.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-485 is significant due to its potential for Cross-Site Scripting attacks.
To mitigate FG-IR-23-485, upgrade FortiOS or FortiProxy to the latest version listed in the advisory.
FG-IR-23-485 affects specific versions of FortiOS and FortiProxy, specifically those prior to 7.4.4, 7.2.10, and 7.0.17.
Remote unauthenticated attackers can exploit FG-IR-23-485, putting users who bookmark malicious sites at risk.
FG-IR-23-485 is classified as an improper neutralization of input during web page generation vulnerability.