Lucene search

K
cveFortinetCVE-2023-41680
HistoryOct 13, 2023 - 3:15 p.m.

CVE-2023-41680

2023-10-1315:15:44
CWE-79
fortinet
web.nvd.nist.gov
38
cve
2023
41680
fortinet
fortisandbox
xss
cross-site scripting
security
vulnerability
http requests

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

30.8%

A improper neutralization of input during web page generation (‘cross-site scripting’) in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.

Affected configurations

Nvd
Node
fortinetfortisandboxRange2.5.02.5.2
OR
fortinetfortisandboxRange3.0.03.0.7
OR
fortinetfortisandboxRange3.1.03.1.5
OR
fortinetfortisandboxRange3.2.03.2.4
OR
fortinetfortisandboxRange4.0.04.0.3
OR
fortinetfortisandboxRange4.2.04.2.5
OR
fortinetfortisandboxRange4.4.04.4.1
OR
fortinetfortisandboxMatch2.4.1
VendorProductVersionCPE
fortinetfortisandbox*cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*
fortinetfortisandbox2.4.1cpe:2.3:a:fortinet:fortisandbox:2.4.1:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiSandbox",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "4.4.0",
        "lessThanOrEqual": "4.4.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "4.2.0",
        "lessThanOrEqual": "4.2.5",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "4.0.0",
        "lessThanOrEqual": "4.0.3",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.2.0",
        "lessThanOrEqual": "3.2.4",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.1.0",
        "lessThanOrEqual": "3.1.5",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "3.0.0",
        "lessThanOrEqual": "3.0.7",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "2.5.0",
        "lessThanOrEqual": "2.5.2",
        "status": "affected"
      },
      {
        "version": "2.4.1",
        "status": "affected"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

30.8%

Related for CVE-2023-41680