Description
Multiple improper neutralization of input during web page generation vulnerabilities [CWE-79] in both the customer and provider interfaces of FortiPortal may allow an attacker to perform reflected Cross-site scripting attacks via specially crafted HTTP request parameters.
Affected Software
Related
{"id": "FG-IR-21-100", "vendorId": null, "type": "fortinet", "bulletinFamily": "software", "title": "FortiPortal - Reflected cross-site scripting due to wrong sanitization context", "description": "Multiple improper neutralization of input during web page generation vulnerabilities [CWE-79] in both the customer and provider interfaces of FortiPortal may allow an attacker to perform reflected Cross-site scripting attacks via specially crafted HTTP request parameters.\n", "published": "2021-11-02T00:00:00", "modified": "2021-11-02T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 2.7}, "href": "https://www.fortiguard.com/psirt/FG-IR-21-100", "reporter": "FortiGuard Labs", "references": [], "cvelist": ["CVE-2021-36176"], "immutableFields": [], "lastseen": "2022-04-28T11:31:12", "viewCount": 8, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2021-36176"]}], "rev": 4}, "score": {"value": 2.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "cve", "idList": ["CVE-2021-36176"]}, {"type": "threatpost", "idList": ["THREATPOST:8126186F4F00A899AE821FA964FD1D17"]}]}, "exploitation": null, "affected_software": {"major_version": [{"name": "fortiportal", "version": 6}, {"name": "fortiportal", "version": 6}, {"name": "fortiportal", "version": 6}, {"name": "fortiportal", "version": 6}, {"name": "fortiportal", "version": 6}, {"name": "fortiportal", "version": 6}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 5}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}, {"name": "fortiportal", "version": 4}]}, "vulnersScore": 2.5}, "_state": {"dependencies": 1659916711, "score": 1659850087, "affected_software_major_version": 1666695388}, "_internal": {"score_hash": "4e22c22d547c270f5da25bafeb4005f3"}, "affectedSoftware": [{"version": "6.0.5", "operator": "eq", "name": "fortiportal"}, {"version": "6.0.4", "operator": "eq", "name": "fortiportal"}, {"version": "6.0.3", "operator": "eq", "name": "fortiportal"}, {"version": "6.0.2", "operator": "eq", "name": "fortiportal"}, {"version": "6.0.1", "operator": "eq", "name": "fortiportal"}, {"version": "6.0.0", "operator": "eq", "name": "fortiportal"}, {"version": "5.3.6", "operator": "eq", "name": "fortiportal"}, {"version": "5.3.5", "operator": "eq", "name": "fortiportal"}, {"version": "5.3.4", "operator": "eq", "name": "fortiportal"}, {"version": "5.3.3", "operator": "eq", "name": "fortiportal"}, {"version": "5.3.2", "operator": "eq", "name": "fortiportal"}, {"version": "5.3.1", "operator": "eq", "name": "fortiportal"}, {"version": "5.3.0", "operator": "eq", "name": "fortiportal"}, {"version": "5.2.6", "operator": "eq", "name": "fortiportal"}, {"version": "5.2.5", "operator": "eq", "name": "fortiportal"}, {"version": "5.2.4", "operator": "eq", "name": "fortiportal"}, {"version": "5.2.3", "operator": "eq", "name": "fortiportal"}, {"version": "5.2.2", "operator": "eq", "name": "fortiportal"}, {"version": "5.2.1", "operator": "eq", "name": "fortiportal"}, {"version": "5.2.0", "operator": "eq", "name": "fortiportal"}, {"version": "5.1.2", "operator": "eq", "name": "fortiportal"}, {"version": "5.1.1", "operator": "eq", "name": "fortiportal"}, {"version": "5.1.0", "operator": "eq", "name": "fortiportal"}, {"version": "5.0.3", "operator": "eq", "name": "fortiportal"}, {"version": "5.0.2", "operator": "eq", "name": "fortiportal"}, {"version": "5.0.1", "operator": "eq", "name": "fortiportal"}, {"version": "5.0.0", "operator": "eq", "name": "fortiportal"}, {"version": "4.2.2", "operator": "eq", "name": "fortiportal"}, {"version": "4.2.1", "operator": "eq", "name": "fortiportal"}, {"version": "4.1.2", "operator": "eq", "name": "fortiportal"}, {"version": "4.1.1", "operator": "eq", "name": "fortiportal"}, {"version": "4.1.0", "operator": "eq", "name": "fortiportal"}, {"version": "4.0.4", "operator": "eq", "name": "fortiportal"}, {"version": "4.0.3", "operator": "eq", "name": "fortiportal"}, {"version": "4.0.2", "operator": "eq", "name": "fortiportal"}, {"version": "4.0.1", "operator": "eq", "name": "fortiportal"}, {"version": "4.0.0", "operator": "eq", "name": "fortiportal"}]}
{"cve": [{"lastseen": "2022-03-23T18:51:18", "description": "Multiple uncontrolled resource consumption vulnerabilities in the web interface of FortiPortal before 6.0.6 may allow a single low-privileged user to induce a denial of service via multiple HTTP requests.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 6.1, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2021-11-02T19:15:00", "type": "cve", "title": "CVE-2021-36176", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-36176"], "modified": "2021-11-04T18:23:00", "cpe": [], "id": "CVE-2021-36176", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36176", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": []}]}