CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
29.2%
A improper neutralization of input during web page generation (‘cross-site scripting’) in Fortinet FortiEDR version 5.1.0, 5.0.0 through 5.0.3 Patch 6 and 4.0.0 allows a remote authenticated attacker to perform a reflected cross site scripting attack (XSS) by injecting malicious payload into the Management Console via various endpoints.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortiedr | * | cpe:2.3:a:fortinet:fortiedr:*:*:*:*:*:*:*:* |
fortinet | fortiedr | 4.0.0 | cpe:2.3:a:fortinet:fortiedr:4.0.0:*:*:*:*:*:*:* |
fortinet | fortiedr | 5.0.3 | cpe:2.3:a:fortinet:fortiedr:5.0.3:-:*:*:*:*:*:* |
fortinet | fortiedr | 5.0.3 | cpe:2.3:a:fortinet:fortiedr:5.0.3:patch1:*:*:*:*:*:* |
fortinet | fortiedr | 5.0.3 | cpe:2.3:a:fortinet:fortiedr:5.0.3:patch2:*:*:*:*:*:* |
fortinet | fortiedr | 5.0.3 | cpe:2.3:a:fortinet:fortiedr:5.0.3:patch3:*:*:*:*:*:* |
fortinet | fortiedr | 5.0.3 | cpe:2.3:a:fortinet:fortiedr:5.0.3:patch4:*:*:*:*:*:* |
fortinet | fortiedr | 5.0.3 | cpe:2.3:a:fortinet:fortiedr:5.0.3:patch5:*:*:*:*:*:* |
fortinet | fortiedr | 5.0.3 | cpe:2.3:a:fortinet:fortiedr:5.0.3:patch6:*:*:*:*:*:* |
fortinet | fortiedr | 5.1.0 | cpe:2.3:a:fortinet:fortiedr:5.1.0:-:*:*:*:*:*:* |
[
{
"product": "Fortinet FortiEDR",
"vendor": "Fortinet",
"versions": [
{
"status": "affected",
"version": "FortiEDR 5.0.3, 5.0.2, 5.0.1, 5.0.0, 4.0.0"
}
]
}
]
More