ID

VAR-202106-1942


CVE

CVE-2021-26092


TITLE

FortiOS  and  FortiProxy  Cross-site scripting vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-018552

DESCRIPTION

Failure to sanitize input in the SSL VPN web portal of FortiOS 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, 6.4.0 through 6.4.4; and FortiProxy 1.2.0 through 1.2.9, 2.0.0 through 2.0.1 may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters. FortiOS and FortiProxy Exists in a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Fortinet FortiGate is a network security platform developed by Fortinet. The platform provides functions such as firewall, antivirus and intrusion prevention (IPS), application control, antispam, wireless controller and WAN acceleration. Fortinet FortiGate has a cross-site scripting vulnerability that stems from insufficient sanitization of user-supplied data in SSL VPN web portals. A remote attacker could exploit this vulnerability to trick the victim into following a specially crafted link to an error page and execute arbitrary HTML and script code in the user's browser within the context of the vulnerable website. The following products and versions are affected: FortiGate: 5.0.0, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 5.0 .11, 5.0.12, 5.0.13, 5.0.14, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6, 5.2.7, 5.2.8 , 5.2.9, 5.2.10, 5.2.11, 5.2.12, 5.2.13, 5.2.14, 5.2.15, 5.4.0, 5.4.1, 5.4.2, 5.4.3, 5.4.4 , 5.4 .5, 5.4.6, 5.4.7, 5.4.8, 5.4.9, 5.4.10, 5.4.11, 5.4.12, 5.4.13, 5.6.0, 5.6.1, 5.6.2, 5.6.3 , 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 5.6.12, 5.6.13, 6.0.0, 6.0.1, 6.0 .2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.0.12, 6.2.0, 6.2.1 , 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4

Trust: 2.25

sources: NVD: CVE-2021-26092 // JVNDB: JVNDB-2021-018552 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-385056

AFFECTED PRODUCTS

vendor:fortinetmodel:fortiosscope:gteversion:6.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:6.0.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:5.4.13

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:5.6.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.0.12

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:eqversion:2.0.0

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:gteversion:1.2.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:6.4.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:5.6.14

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:eqversion:2.0.1

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.2.7

Trust: 1.0

vendor:fortinetmodel:fortiproxyscope:lteversion:1.2.9

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:5.2.15

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:5.2.10

Trust: 1.0

vendor:fortinetmodel:fortiosscope:gteversion:5.4.0

Trust: 1.0

vendor:fortinetmodel:fortiosscope:lteversion:6.4.4

Trust: 1.0

vendor:フォーティネットmodel:fortiproxyscope: - version: -

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope:eqversion:6.2.0 to 6.2.7

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope:eqversion:6.4.0 to 6.4.4

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope:eqversion:6.0.0 to 6.0.12

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope:eqversion:5.6.0 to 5.6.14

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope:eqversion:5.2.10 to 5.2.15

Trust: 0.8

vendor:フォーティネットmodel:fortiosscope:eqversion:5.4.0 to 5.4.13

Trust: 0.8

sources: JVNDB: JVNDB-2021-018552 // NVD: CVE-2021-26092

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-26092
value: MEDIUM

Trust: 1.0

psirt@fortinet.com: CVE-2021-26092
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-26092
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202106-012
value: MEDIUM

Trust: 0.6

VULHUB: VHN-385056
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-26092
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-385056
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-26092
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 2.7
version: 3.1

Trust: 1.0

psirt@fortinet.com: CVE-2021-26092
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-26092
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: CHANGED
confidentialityImpact: LOW
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-385056 // JVNDB: JVNDB-2021-018552 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-012 // NVD: CVE-2021-26092 // NVD: CVE-2021-26092

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.1

problemtype:Cross-site scripting (CWE-79) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-385056 // JVNDB: JVNDB-2021-018552 // NVD: CVE-2021-26092

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202106-012

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:FG-IR-20-199url:https://www.fortiguard.com/psirt/FG-IR-20-199

Trust: 0.8

sources: JVNDB: JVNDB-2021-018552

EXTERNAL IDS

db:NVDid:CVE-2021-26092

Trust: 3.3

db:JVNDBid:JVNDB-2021-018552

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.1887

Trust: 0.6

db:CS-HELPid:SB2021060124

Trust: 0.6

db:CNNVDid:CNNVD-202106-012

Trust: 0.6

db:CNVDid:CNVD-2022-50950

Trust: 0.1

db:VULHUBid:VHN-385056

Trust: 0.1

sources: VULHUB: VHN-385056 // JVNDB: JVNDB-2021-018552 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-012 // NVD: CVE-2021-26092

REFERENCES

url:https://fortiguard.com/psirt/fg-ir-20-199

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-26092

Trust: 1.4

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://vigilance.fr/vulnerability/fortigate-cross-site-scripting-via-ssl-vpn-portal-error-page-35583

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1887

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2021-26092/

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060124

Trust: 0.6

sources: VULHUB: VHN-385056 // JVNDB: JVNDB-2021-018552 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-012 // NVD: CVE-2021-26092

SOURCES

db:VULHUBid:VHN-385056
db:JVNDBid:JVNDB-2021-018552
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202106-012
db:NVDid:CVE-2021-26092

LAST UPDATE DATE

2024-08-14T13:13:06.397000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-385056date:2022-03-02T00:00:00
db:JVNDBid:JVNDB-2021-018552date:2023-06-22T03:06:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202106-012date:2022-03-10T00:00:00
db:NVDid:CVE-2021-26092date:2022-03-02T16:28:07.387

SOURCES RELEASE DATE

db:VULHUBid:VHN-385056date:2022-02-24T00:00:00
db:JVNDBid:JVNDB-2021-018552date:2023-06-22T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202106-012date:2021-06-01T00:00:00
db:NVDid:CVE-2021-26092date:2022-02-24T03:15:43.407