Fortinet FortiADC D-series 3.2.0, and possibly earlier versions, contains a cross-site scripting vulnerability. (CWE-79)
CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Fortinet FortiADC D-series 3.2.0, and possibly earlier versions, contains a cross-site scripting vulnerability. The "
locale" parameter in the "
/FortiADC/gui_partA/?locale=en" page is vulnerable to a reflected cross-site scripting attack.
A remote unauthenticated attacker may be able to execute arbitrary script in the context of the end-user's browser session.
Apply an Update
FortiADC D-series 3.2.1 has been released to address this vulnerability.
As a general good security practice, only allow connections from trusted hosts and networks. Note that restricting access does not prevent XSS attacks since the attack comes as an HTTP request from a legitimate user's host. Restricting access would prevent an attacker from accessing the FortiADC interface using stolen credentials from a blocked network location.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Notified: February 07, 2014 Updated: April 11, 2014
We have not received a statement from the vendor.
We are not aware of further vendor information regarding this vulnerability.
Group | Score | Vector
Base | 4.3 | AV:N/AC:M/Au:N/C:P/I:N/A:N
Temporal | 3.7 | E:POC/RL:W/RC:C
Environmental | 2.8 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND
Thanks to William Costa for reporting this vulnerability.
This document was written by Jared Allar.
CVE IDs: | CVE-2014-0331
Date Public: | 2014-04-11
Date First Published: | 2014-04-11
Date Last Updated: | 2014-04-15 19:58 UTC
Document Revision: | 24