Multiple cross-site scripting (XSS) vulnerabilities in Java number format exception handling in FortiGate FortiDB before 4.4.2 allow remote attackers to inject arbitrary web script or HTML via the conversationContext parameter to (1) admin/auditTrail.jsf, (2) mapolicymgmt/targetsMonitorView.jsf, (3) vascan/globalsummary.jsf, (4) vaerrorlog/vaErrorLog.jsf, (5) database/listTargetGroups.jsf, (6) sysconfig/listSystemInfo.jsf, (7) vascan/list.jsf, (8) network/router.jsf, (9) mapolicymgmt/editPolicyProfile.jsf, or (10) mapolicymgmt/maPolicyMasterList.jsf.
References
Link | Resource |
---|---|
https://www.vulnerability-lab.com/get_content.php?id=558 | Exploit Third Party Advisory |
https://fortiguard.com/psirt/FG-IR-012-007 | Vendor Advisory |
Configurations
Information
Published : 2018-02-09 14:29
Updated : 2018-02-27 07:59
NVD link : CVE-2012-6347
Mitre link : CVE-2012-6347
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
fortinet
- fortidb