A Cross-Site Scripting (XSS) vulnerability in Fortinet FortiWLC 6.1-x (6.1-2, 6.1-4 and 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); and 8.x (8.0, 8.1, 8.2 and 8.3.0-8.3.2) allows an authenticated user to inject arbitrary web script or HTML via non-sanitized parameters "refresh" and "branchtotable" present in HTTP POST requests.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101287 | Third Party Advisory VDB Entry |
https://fortiguard.com/psirt/FG-IR-17-106 | Vendor Advisory |
http://www.securityfocus.com/bid/101287 | Third Party Advisory VDB Entry |
https://fortiguard.com/psirt/FG-IR-17-106 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/101287 - Third Party Advisory, VDB Entry | |
References | () https://fortiguard.com/psirt/FG-IR-17-106 - Vendor Advisory |
Information
Published : 2017-10-26 13:29
Updated : 2024-11-21 03:31
NVD link : CVE-2017-7335
Mitre link : CVE-2017-7335
CVE.ORG link : CVE-2017-7335
JSON object : View
Products Affected
fortinet
- fortiwlc
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')