An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiADC GUI version 7.4.0, 7.2.0 through 7.2.1 and before 7.1.3 allows an authenticated attacker to perform an XSS attack via crafted HTTP or HTTPs requests.
References
History

Tue, 11 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 11 Mar 2025 15:00:00 +0000

Type Values Removed Values Added
Description An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiADC GUI version 7.4.0, 7.2.0 through 7.2.1 and before 7.1.3 allows an authenticated attacker to perform an XSS attack via crafted HTTP or HTTPs requests.
First Time appeared Fortinet
Fortinet fortiadc
Weaknesses CWE-79
CPEs cpe:2.3:h:fortinet:fortiadc:5.3.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.3.7:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:5.4.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.1.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:6.2.6:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.4:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.0.5:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.2:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.1.3:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.2.1:*:*:*:*:*:*:*
cpe:2.3:h:fortinet:fortiadc:7.4.0:*:*:*:*:*:*:*
Vendors & Products Fortinet
Fortinet fortiadc
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2025-03-12T04:00:48.179Z

Reserved: 2023-07-11T08:16:54.092Z

Link: CVE-2023-37933

cve-icon Vulnrichment

Updated: 2025-03-11T16:03:26.194Z

cve-icon NVD

Status : Received

Published: 2025-03-11T15:15:38.480

Modified: 2025-03-11T15:15:38.480

Link: CVE-2023-37933

cve-icon Redhat

No data.