SSLVPN WEB UI Text injection

Summary

An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS and FortiProxy SSL-VPN web user interface may allow a remote unauthenticated attacker to perform phishing attempts via crafted requests.

Version Affected Solution
FortiOS 7.6 Not affected Not Applicable
FortiOS 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiOS 7.2 7.2.0 through 7.2.8 Upgrade to 7.2.9 or above
FortiOS 7.0 7.0 all versions Migrate to a fixed release
FortiProxy 7.4 7.4.0 through 7.4.3 Upgrade to 7.4.4 or above
FortiProxy 7.2 7.2.0 through 7.2.9 Upgrade to 7.2.10 or above
FortiProxy 7.0 7.0.0 through 7.0.16 Upgrade to 7.0.17 or above
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Fortinet in Q3/24 has remediated this issue in FortiSASE version 24.2.c and hence the customers need not perform any action.

Workaround:
Disable SSL-VPN.

Acknowledgement

Fortinet is pleased to thank Livio Victoriano, Michal Majchrowicz and Marcin Wyczechowski from AFINE Team for reporting this vulnerability under responsible disclosure.

Timeline

2024-11-12: Initial publication