FortiADC XSS

MEDIUM (4.7) Patch Available

Threat Intelligence

Low Risk
EPSS Score: 0.03% chance of exploitation (percentile: 10%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

FortiADC is a web application firewall (WAF) solution used to protect against web-based attacks. The vulnerability discovered in FortiADC allows an attacker to execute unauthorized code or commands via crafted URLs on the default error page, which can lead to potential security breaches.

Am I affected?

You're affected if you use FortiADC 7.4, 7.2, or earlier versions. To check if your version is affected, run the following command:

grep -r "waf_deny.html" /var/log/fortinet

Note: This command checks for the presence of the waf_deny.html file in the FortiADC log directory. If you don't find this file, it's likely that your version is not affected.

Affected Products

Fortinet / FortiADC

How to fix

To fix this vulnerability, upgrade to a fixed release:

  • FortiADC 7.4: Migrate to a fixed release (version 7.4.8 or later)
  • FortiADC 7.2: Migrate to a fixed release (version 7.4.8 or later)

Immediate mitigations:

  • Do not use the waf_deny.html error page or customize it to either remove the "error-info" class or change it into a standard hardcoded message.

References