Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-26092


Failure to sanitize input in the SSL VPN web portal of FortiOS 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, 6.4.0 through 6.4.4; and FortiProxy 1.2.0 through 1.2.9, 2.0.0 through 2.0.1 may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters.


Published

2022-02-24T03:15:43.407

Last Modified

2024-11-21T05:55:51.277

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 4.7 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application fortinet fortiproxy ≤ 1.2.9 Yes
Application fortinet fortiproxy 2.0.0 Yes
Application fortinet fortiproxy 2.0.1 Yes
Operating System fortinet fortios ≤ 5.2.15 Yes
Operating System fortinet fortios ≤ 5.4.13 Yes
Operating System fortinet fortios ≤ 5.6.14 Yes
Operating System fortinet fortios ≤ 6.0.12 Yes
Operating System fortinet fortios ≤ 6.2.7 Yes
Operating System fortinet fortios ≤ 6.4.4 Yes

References