SSLVPN WEB UI Text injection
Summary
An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS and FortiProxy SSL-VPN web user interface may allow a remote unauthenticated attacker to perform phishing attempts via crafted requests.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.6 | Not affected | Not Applicable |
| FortiOS 7.4 | 7.4.0 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.8 | Upgrade to 7.2.9 or above |
| FortiOS 7.0 | 7.0 all versions | Migrate to a fixed release |
| FortiProxy 7.4 | 7.4.0 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiProxy 7.2 | 7.2.0 through 7.2.9 | Upgrade to 7.2.10 or above |
| FortiProxy 7.0 | 7.0.0 through 7.0.16 | Upgrade to 7.0.17 or above |
Fortinet in Q3/24 has remediated this issue in FortiSASE version 24.2.c and hence the customers need not perform any action.
Workaround:
Disable SSL-VPN.