fkie_cve-2017-7335
Vulnerability from fkie_nvd
Published
2017-10-26 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
A Cross-Site Scripting (XSS) vulnerability in Fortinet FortiWLC 6.1-x (6.1-2, 6.1-4 and 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); and 8.x (8.0, 8.1, 8.2 and 8.3.0-8.3.2) allows an authenticated user to inject arbitrary web script or HTML via non-sanitized parameters "refresh" and "branchtotable" present in HTTP POST requests.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@fortinet.com | http://www.securityfocus.com/bid/101287 | Third Party Advisory, VDB Entry | |
| psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-17-106 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101287 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-17-106 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fortinet | fortiwlc | 6.1-2 | |
| fortinet | fortiwlc | 6.1-4 | |
| fortinet | fortiwlc | 6.1-5 | |
| fortinet | fortiwlc | 7.0-7 | |
| fortinet | fortiwlc | 7.0-8 | |
| fortinet | fortiwlc | 7.0-9 | |
| fortinet | fortiwlc | 7.0-10 | |
| fortinet | fortiwlc | 8.0 | |
| fortinet | fortiwlc | 8.1 | |
| fortinet | fortiwlc | 8.2 | |
| fortinet | fortiwlc | 8.3.0 | |
| fortinet | fortiwlc | 8.3.1 | |
| fortinet | fortiwlc | 8.3.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:6.1-2:*:*:*:*:*:*:*",
"matchCriteriaId": "D87F7FFB-1E43-4CEE-8F5C-85A6F87AF447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:6.1-4:*:*:*:*:*:*:*",
"matchCriteriaId": "87D90FE1-EDA4-40F6-ADB0-969CAB8645F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:6.1-5:*:*:*:*:*:*:*",
"matchCriteriaId": "347BFB74-E014-4C31-B292-08BC6B96B2F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:7.0-7:*:*:*:*:*:*:*",
"matchCriteriaId": "5C562DA6-693C-4C16-A69A-17293C010D16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:7.0-8:*:*:*:*:*:*:*",
"matchCriteriaId": "5005218E-1CE5-49D9-BBF8-07DC6BDE1E03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:7.0-9:*:*:*:*:*:*:*",
"matchCriteriaId": "224292C5-AA1F-4ECE-A89A-08DD0BD5CDCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:7.0-10:*:*:*:*:*:*:*",
"matchCriteriaId": "743234D6-C2B9-4980-969D-C6811142CAE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E03C8D2-C2DC-42FA-BB60-AAE542646B63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CBAC292-6C47-41BC-92A0-2038280D3FB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CE5B0F43-DFFF-4603-AAB3-742F9E9F7ECE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:8.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "138354E5-2281-422B-95D9-879D900DFF1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:8.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6300548E-1D1B-4F9D-9894-0C4D2906E2A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortiwlc:8.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "28C337BE-93A1-4AC4-87D3-4F620A05AF1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting (XSS) vulnerability in Fortinet FortiWLC 6.1-x (6.1-2, 6.1-4 and 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); and 8.x (8.0, 8.1, 8.2 and 8.3.0-8.3.2) allows an authenticated user to inject arbitrary web script or HTML via non-sanitized parameters \"refresh\" and \"branchtotable\" present in HTTP POST requests."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en Fortinet FortiWLC en versiones 6.1-x (6.1-2, 6.1-4 y 6.1-5); 7.0-x (7.0-7, 7.0-8, 7.0-9, 7.0-10); y 8.x (8.0, 8.1, 8.2 y 8.3.0-8.3.2) permite que un usuario autenticado inyecte scripts web o HTML arbitrarios mediante par\u00e1metros \"refresh\" y \"branchtotable\" no sanitizados presentes en peticiones HTTP POST."
}
],
"id": "CVE-2017-7335",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-10-26T13:29:00.277",
"references": [
{
"source": "psirt@fortinet.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101287"
},
{
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
],
"url": "https://fortiguard.com/psirt/FG-IR-17-106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://fortiguard.com/psirt/FG-IR-17-106"
}
],
"sourceIdentifier": "psirt@fortinet.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…