Multiple cross-site scripting (XSS) vulnerabilities in Java number format exception handling in FortiGate FortiDB before 4.4.2 allow remote attackers to inject arbitrary web script or HTML via the conversationContext parameter to (1) admin/auditTrail.jsf, (2) mapolicymgmt/targetsMonitorView.jsf, (3) vascan/globalsummary.jsf, (4) vaerrorlog/vaErrorLog.jsf, (5) database/listTargetGroups.jsf, (6) sysconfig/listSystemInfo.jsf, (7) vascan/list.jsf, (8) network/router.jsf, (9) mapolicymgmt/editPolicyProfile.jsf, or (10) mapolicymgmt/maPolicyMasterList.jsf.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-012-007 | Vendor Advisory |
https://www.vulnerability-lab.com/get_content.php?id=558 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-02-09 22:29
Updated : 2024-02-28 16:25
NVD link : CVE-2012-6347
Mitre link : CVE-2012-6347
CVE.ORG link : CVE-2012-6347
JSON object : View
Products Affected
fortinet
- fortidb
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')