Learn about CVE-2019-17651 affecting Fortinet FortiSIEM version 5.2.5 and earlier, allowing remote authenticated attackers to execute Stored Cross-Site Scripting attacks. Find mitigation steps and preventive measures.
FortiSIEM version 5.2.5 and earlier contain an input vulnerability that allows a remote authenticated attacker to execute a Stored Cross-Site Scripting attack.
Understanding CVE-2019-17651
What is CVE-2019-17651?
FortiSIEM version 5.2.5 and below have a vulnerability in the description and title parameters of a Device Maintenance Schedule, enabling attackers to inject malicious JavaScript code.
The Impact of CVE-2019-17651
This vulnerability can be exploited by a remote authenticated attacker to execute a Stored Cross-Site Scripting attack (XSS) by inserting malicious JavaScript code into the description field of a Device Maintenance schedule.
Technical Details of CVE-2019-17651
Vulnerability Description
An Improper Neutralization of Input vulnerability in the description and title parameters of a Device Maintenance Schedule in FortiSIEM version 5.2.5 and below may allow a remote authenticated attacker to perform a Stored Cross-Site Scripting attack (XSS) by injecting malicious JavaScript code into the description field of a Device Maintenance schedule.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by a remote authenticated attacker to execute a Stored Cross-Site Scripting attack (XSS) by inserting malicious JavaScript code into the description field of a Device Maintenance schedule.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Apply the latest patches and updates provided by Fortinet to address this vulnerability.