Fortinet FortiOS 5.x < 5.4.8 / 5.6.x < 5.6.3 HTTP Host Header XSS(FG-IR-17-262)

Medium Nessus Plugin ID 106583


The remote host is affected by a cross-site scripting vulnerability.


The version of Fortinet FortiOS running on the remote device is 5.x prior to 5.4.8, or 5.6.x prior to 5.6.3. It is, therefore, affected by a Cross-site Scripting (XSS) vulnerability that would allow an attacker to inject an HTML request through the 'Host' headers of the web proxy disclaimer page.

Note that Nessus has not checked for the workaround.


Upgrade to Fortinet FortiOS version 5.4.8 / 5.6.3 or later.

See Also

Plugin Details

Severity: Medium

ID: 106583

File Name: fortios_FG-IR-17-262.nasl

Version: 1.6

Type: local

Family: Firewalls

Published: 2018/02/02

Modified: 2018/07/12

Dependencies: 73522

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Base Score: 4.7

Temporal Score: 4.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:fortinet:fortios

Required KB Items: Host/Fortigate/model, Host/Fortigate/version

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2018/01/28

Vulnerability Publication Date: 2018/01/28

Reference Information

CVE: CVE-2017-14190

BID: 102779