Remote Code Execution Vulnerability in Fortinet FortiPortal GUI
CVE-2021-32602
5.8MEDIUM
Summary
The FortiPortal GUI contains a vulnerability that arises from improper handling of user input during the generation of web pages. An attacker can exploit this flaw by sending a specially crafted request containing invalid parameters, which can allow for Cross-Site Scripting (XSS) attacks. This may lead to unauthorized access and manipulation of user sessions. It is crucial for organizations using FortiPortal to assess their current versions and apply necessary updates to safeguard against potential exploit attempts.
Affected Version(s)
Fortinet FortiPortal FortiPortal 6.0.4 and below, 5.3.6 and below, 5.2.6 and below, 5.1.2 and below, 5.0.3 and below, 4.2.2 and below, 4.1.2 and below, 4.0.4 and below.
References
CVSS V3.1
Score:
5.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved