Vulnerability Description
Multiple cross-site scripting (XSS) vulnerabilities in Java number format exception handling in FortiGate FortiDB before 4.4.2 allow remote attackers to inject arbitrary web script or HTML via the conversationContext parameter to (1) admin/auditTrail.jsf, (2) mapolicymgmt/targetsMonitorView.jsf, (3) vascan/globalsummary.jsf, (4) vaerrorlog/vaErrorLog.jsf, (5) database/listTargetGroups.jsf, (6) sysconfig/listSystemInfo.jsf, (7) vascan/list.jsf, (8) network/router.jsf, (9) mapolicymgmt/editPolicyProfile.jsf, or (10) mapolicymgmt/maPolicyMasterList.jsf.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortidb | <= 4.4.1 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/psirt/FG-IR-012-007Vendor Advisory
- https://www.vulnerability-lab.com/get_content.php?id=558ExploitThird Party Advisory
- https://fortiguard.com/psirt/FG-IR-012-007Vendor Advisory
- https://www.vulnerability-lab.com/get_content.php?id=558ExploitThird Party Advisory
FAQ
What is CVE-2012-6347?
CVE-2012-6347 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Multiple cross-site scripting (XSS) vulnerabilities in Java number format exception handling in FortiGate FortiDB before 4.4.2 allow remote attackers to inject arbitrary web script or HTML via the con...
How severe is CVE-2012-6347?
CVE-2012-6347 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6347?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortidb.