Cross site scripting vulnerability in SSL VPN web UI
Summary
An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS and FortiProxy's web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via social engineering the targeted user into bookmarking a malicious samba server, then opening the bookmark.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.4 | 7.4.0 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.7 | Upgrade to 7.2.8 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.13 | Upgrade to 7.0.14 or above |
| FortiOS 6.4 | 6.4 all versions | Migrate to a fixed release |
| FortiProxy 7.4 | 7.4.0 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiProxy 7.2 | 7.2.0 through 7.2.9 | Upgrade to 7.2.10 or above |
| FortiProxy 7.0 | 7.0.0 through 7.0.16 | Upgrade to 7.0.17 or above |
| FortiProxy 2.0 | Not affected | Not Applicable |
Workaround:
Disable SSL-VPN web-mode.
Acknowledgement
Fortinet is pleased to thank Jamie Riden from IOActive for reporting this vulnerability under responsible disclosure.Timeline
2024-07-09: Initial publication2024-07-10: Impacted versions updated
2024-07-11: Added workaround
2024-07-19: Acknowledgment updated