CVE-2022-39950
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An improper neutralization of input during web page generation vulnerability [CWE-79] exists in FortiManager and FortiAnalyzer 6.0.0 all versions, 6.2.0 all versions, 6.4.0 through 6.4.8, and 7.0.0 through 7.0.4. Report templates may allow a low privilege level attacker to perform an XSS attack via posting a crafted CKeditor "protected" comment as described in CVE-2020-9281.
Existe una neutralización inadecuada de la entrada durante la vulnerabilidad de generación de páginas web [CWE-79] en FortiManager y FortiAnalyzer 6.0.0 todas las versiones, 6.2.0 todas las versiones, 6.4.0 a 6.4.8 y 7.0.0 a 7.0.4. Las plantillas de informes pueden permitir que un atacante de bajo nivel de privilegios realice un ataque XSS mediante la publicación de un comentario "protected" de CKeditor manipulado como se describe en CVE-2020-9281.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2022-09-05 CVE Reserved
- 2022-11-02 CVE Published
- 2024-05-25 EPSS Updated
- 2024-10-25 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-21-228 | 2022-11-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortianalyzer Search vendor "Fortinet" for product "Fortianalyzer" | >= 6.0.0 <= 6.2.9 Search vendor "Fortinet" for product "Fortianalyzer" and version " >= 6.0.0 <= 6.2.9" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortianalyzer Search vendor "Fortinet" for product "Fortianalyzer" | >= 6.4.0 <= 6.4.8 Search vendor "Fortinet" for product "Fortianalyzer" and version " >= 6.4.0 <= 6.4.8" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortianalyzer Search vendor "Fortinet" for product "Fortianalyzer" | >= 7.0.0 <= 7.0.4 Search vendor "Fortinet" for product "Fortianalyzer" and version " >= 7.0.0 <= 7.0.4" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortimanager Search vendor "Fortinet" for product "Fortimanager" | >= 6.0.0 <= 6.2.9 Search vendor "Fortinet" for product "Fortimanager" and version " >= 6.0.0 <= 6.2.9" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortimanager Search vendor "Fortinet" for product "Fortimanager" | >= 6.4.0 <= 6.4.8 Search vendor "Fortinet" for product "Fortimanager" and version " >= 6.4.0 <= 6.4.8" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortimanager Search vendor "Fortinet" for product "Fortimanager" | >= 7.0.0 <= 7.0.4 Search vendor "Fortinet" for product "Fortimanager" and version " >= 7.0.0 <= 7.0.4" | - |
Affected
|