Headline
CVE-2021-26092: Fortiguard
Failure to sanitize input in the SSL VPN web portal of FortiOS 5.2.10 through 5.2.15, 5.4.0 through 5.4.13, 5.6.0 through 5.6.14, 6.0.0 through 6.0.12, 6.2.0 through 6.2.7, 6.4.0 through 6.4.4; and FortiProxy 1.2.0 through 1.2.9, 2.0.0 through 2.0.1 may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters.
PSIRT Advisories
FortiGate SSL VPN portal is vulnerable to an XSS
Summary
Failure to sanitize input in the SSL VPN web portal may allow a remote unauthenticated attacker to perform a reflected Cross-site Scripting (XSS) attack by sending a request to the error page with malicious GET parameters.
Affected Products
FortiGate versions 5.6.x. FortiGate versions 6.0.12 and below. FortiGate versions 6.2.7 and below. FortiGate versions 6.4.5 and below.
Solutions
Please upgrade to FortiGate upcoming 6.0.13 or above.
Please upgrade to FortiGate version 6.2.8 or above.
Please upgrade to FortiGate version 6.4.6 or above.
Please upgrade to FortiGate version 7.0.0 or above.
Acknowledgement
Fortinet is pleased to thank Damian Rusinek for reporting this issue under responsible disclosure.