CVE-2023-41680
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.1 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Una neutralización inadecuada de la entrada durante la generación de la página web ("cross-site scripting") en Fortinet FortiSandbox versión 4.4.1 y 4.4.0 y 4.2.0 a 4.2.5 y 4.0.0 a 4.0.3 y 3.2.0 a 3.2 .4 y 3.1.0 hasta 3.1.5 y 3.0.0 hasta 3.0.7 y 2.5.0 hasta 2.5.2 y 2.4.1 permiten a un atacante ejecutar código o comandos no autorizados a través de solicitudes HTTP manipuladas.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-08-30 CVE Reserved
- 2023-10-13 CVE Published
- 2024-10-19 EPSS Updated
- 2024-10-22 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/psirt/FG-IR-23-311 | 2023-11-07 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | >= 2.5.0 <= 2.5.2 Search vendor "Fortinet" for product "Fortisandbox" and version " >= 2.5.0 <= 2.5.2" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | >= 3.0.0 <= 3.0.7 Search vendor "Fortinet" for product "Fortisandbox" and version " >= 3.0.0 <= 3.0.7" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | >= 3.1.0 <= 3.1.5 Search vendor "Fortinet" for product "Fortisandbox" and version " >= 3.1.0 <= 3.1.5" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | >= 3.2.0 <= 3.2.4 Search vendor "Fortinet" for product "Fortisandbox" and version " >= 3.2.0 <= 3.2.4" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | >= 4.0.0 <= 4.0.3 Search vendor "Fortinet" for product "Fortisandbox" and version " >= 4.0.0 <= 4.0.3" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | >= 4.2.0 <= 4.2.5 Search vendor "Fortinet" for product "Fortisandbox" and version " >= 4.2.0 <= 4.2.5" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | >= 4.4.0 <= 4.4.1 Search vendor "Fortinet" for product "Fortisandbox" and version " >= 4.4.0 <= 4.4.1" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortisandbox Search vendor "Fortinet" for product "Fortisandbox" | 2.4.1 Search vendor "Fortinet" for product "Fortisandbox" and version "2.4.1" | - |
Affected
|