Vulnerability Details CVE-2023-41844
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.4 allows attacker to execute unauthorized code or commands via crafted HTTP requests in capture traffic endpoint.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 61.9%
CVSS Severity
CVSS v3 Score 3.5
Products affected by CVE-2023-41844
-
cpe:2.3:a:fortinet:fortisandbox:3.0.0
-
cpe:2.3:a:fortinet:fortisandbox:3.0.1
-
cpe:2.3:a:fortinet:fortisandbox:3.0.2
-
cpe:2.3:a:fortinet:fortisandbox:3.0.3
-
cpe:2.3:a:fortinet:fortisandbox:3.0.4
-
cpe:2.3:a:fortinet:fortisandbox:3.0.5
-
cpe:2.3:a:fortinet:fortisandbox:3.0.6
-
cpe:2.3:a:fortinet:fortisandbox:3.0.7
-
cpe:2.3:a:fortinet:fortisandbox:3.1.0
-
cpe:2.3:a:fortinet:fortisandbox:3.1.1
-
cpe:2.3:a:fortinet:fortisandbox:3.1.2
-
cpe:2.3:a:fortinet:fortisandbox:3.1.3
-
cpe:2.3:a:fortinet:fortisandbox:3.1.4
-
cpe:2.3:a:fortinet:fortisandbox:3.1.5
-
cpe:2.3:a:fortinet:fortisandbox:3.2.0
-
cpe:2.3:a:fortinet:fortisandbox:3.2.1
-
cpe:2.3:a:fortinet:fortisandbox:3.2.2
-
cpe:2.3:a:fortinet:fortisandbox:3.2.3
-
cpe:2.3:a:fortinet:fortisandbox:3.2.4
-
cpe:2.3:a:fortinet:fortisandbox:4.0.0
-
cpe:2.3:a:fortinet:fortisandbox:4.0.1
-
cpe:2.3:a:fortinet:fortisandbox:4.0.2
-
cpe:2.3:a:fortinet:fortisandbox:4.0.3
-
cpe:2.3:a:fortinet:fortisandbox:4.0.4
-
cpe:2.3:a:fortinet:fortisandbox:4.2.0
-
cpe:2.3:a:fortinet:fortisandbox:4.2.3
-
cpe:2.3:a:fortinet:fortisandbox:4.2.4
-
cpe:2.3:a:fortinet:fortisandbox:4.2.5
-
cpe:2.3:a:fortinet:fortisandbox:4.4.0
-
cpe:2.3:a:fortinet:fortisandbox:4.4.1
-
cpe:2.3:a:fortinet:fortisandbox:4.4.2