Cross site scripting vulnerability in SSL VPN web UI

Summary

An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS and FortiProxy's web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via social engineering the targeted user into bookmarking a malicious samba server, then opening the bookmark.

Version Affected Solution
FortiOS 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiOS 7.2 7.2.0 through 7.2.7 Upgrade to 7.2.8 or above
FortiOS 7.0 7.0.0 through 7.0.13 Upgrade to 7.0.14 or above
FortiOS 6.4 6.4 all versions Migrate to a fixed release
FortiProxy 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiProxy 7.2 7.2.0 through 7.2.9 Upgrade to 7.2.10 or above
FortiProxy 7.0 7.0.0 through 7.0.16 Upgrade to 7.0.17 or above
FortiProxy 2.0 Not affected Not Applicable
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Workaround:
Disable SSL-VPN web-mode.

Acknowledgement

Fortinet is pleased to thank Jamie Riden from IOActive for reporting this vulnerability under responsible disclosure.

Timeline

2024-07-09: Initial publication
2024-07-10: Impacted versions updated
2024-07-11: Added workaround
2024-07-19: Acknowledgment updated