2025-03-23 03:03:54 +00:00

60 lines
2.2 KiB
JSON

{
"id": "CVE-2024-26006",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-14T10:15:14.520",
"lastModified": "2025-03-14T10:15:14.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS version 7.4.3 and below, version 7.2.7 and below, version 7.0.13 and below and FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via a malicious samba server."
},
{
"lang": "es",
"value": "Una vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web [CWE-79] en la interfaz de usuario web SSL VPN de FortiOS versi\u00f3n 7.4.3 y anteriores, versi\u00f3n 7.2.7 y anteriores, versi\u00f3n 7.0.13 y anteriores y FortiProxy versi\u00f3n 7.4.3 y anteriores, versi\u00f3n 7.2.9 y anteriores, versi\u00f3n 7.0.16 y anteriores puede permitir que un atacante remoto no autenticado realice un ataque de cross-site scripting a trav\u00e9s de un servidor samba malicioso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-485",
"source": "psirt@fortinet.com"
}
]
}