CVE-2021-26092
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Failure to sanitize input in the SSL VPN web portal of FortiOS 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, 6.4.0 through 6.4.4; and FortiProxy 1.2.0 through 1.2.9, 2.0.0 through 2.0.1 may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters.
Un fallo en el saneo de la entrada en el portal web SSL VPN de FortiOS versiones 5.2.10 hasta 5.2.15, 5.4.0 hasta 5.4.13, 5.6.0 hasta 5.6.14, 6.0.0 hasta 6.0.12, 6.2.0 hasta 6.2.7, 6.4.0 hasta 6.4.4; y FortiProxy 1. 2.0 hasta 1.2.9, 2.0.0 hasta 2.0.1, pueden permitir a un atacante remoto no autenticado llevar a cabo un ataque de tipo Cross-site Scripting (XSS) reflejado mediante el envío una petición a la página de error con parámetros GET maliciosos
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2021-01-25 CVE Reserved
- 2022-02-24 CVE Published
- 2024-10-22 CVE Updated
- 2024-11-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-20-199 | 2022-03-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | >= 1.2.0 <= 1.2.9 Search vendor "Fortinet" for product "Fortiproxy" and version " >= 1.2.0 <= 1.2.9" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | 2.0.0 Search vendor "Fortinet" for product "Fortiproxy" and version "2.0.0" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiproxy Search vendor "Fortinet" for product "Fortiproxy" | 2.0.1 Search vendor "Fortinet" for product "Fortiproxy" and version "2.0.1" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 5.2.10 <= 5.2.15 Search vendor "Fortinet" for product "Fortios" and version " >= 5.2.10 <= 5.2.15" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 5.4.0 <= 5.4.13 Search vendor "Fortinet" for product "Fortios" and version " >= 5.4.0 <= 5.4.13" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 5.6.0 <= 5.6.14 Search vendor "Fortinet" for product "Fortios" and version " >= 5.6.0 <= 5.6.14" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 6.0.0 <= 6.0.12 Search vendor "Fortinet" for product "Fortios" and version " >= 6.0.0 <= 6.0.12" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 6.2.0 <= 6.2.7 Search vendor "Fortinet" for product "Fortios" and version " >= 6.2.0 <= 6.2.7" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortios Search vendor "Fortinet" for product "Fortios" | >= 6.4.0 <= 6.4.4 Search vendor "Fortinet" for product "Fortios" and version " >= 6.4.0 <= 6.4.4" | - |
Affected
|