-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2021.0414
                       XSS vulnerability in FortiWeb
                              5 February 2021

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           FortiWeb
Publisher:         FortiGuard
Operating System:  Network Appliance
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2021-22122  

Original Bulletin: 
   https://www.fortiguard.com/psirt/FG-IR-20-122

- --------------------------BEGIN INCLUDED TEXT--------------------

XSS vulnerability in FortiWeb

IR Number : FG-IR-20-122

Date      : Jan 29, 2021

Risk      : 3/5

CVSSv3 Score: 4.6

Impact    : Execute unauthorized code or commands

CVE ID	  : CVE-2021-22122

Summary

An improper neutralization of input during web page generation in FortiWeb GUI
interface may allow an unauthenticated, remote attacker to perform a reflected
cross site scripting attack (XSS) by injecting malicious payload in different
vulnerable API end-points.

Impact

Execute unauthorized code or commands

Affected Products

FortiWeb versions 6.3.7 and below. FortiWeb versions 6.2.3 and below.

Solutions

Please upgrade to FortiWeb versions 6.3.8 or above. Please upgrade to FortiWeb
versions 6.2.4 or above.

Acknowledgement

Fortinet is pleased to thank Andrey Medov from ptsecurity for reporting this
vulnerability under responsible disclosure.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=5z3u
-----END PGP SIGNATURE-----