CVE-2023-29183

8.0 HIGH

📋 TL;DR

This cross-site scripting (XSS) vulnerability in Fortinet's FortiProxy and FortiOS web management interfaces allows authenticated attackers to inject and execute malicious JavaScript code via crafted guest management settings. Attackers could steal session cookies, perform actions as the authenticated user, or redirect users to malicious sites. Affected users include organizations running vulnerable versions of FortiProxy or FortiOS with web management interfaces accessible to authenticated users.

💻 Affected Systems

Products:
  • FortiProxy
  • FortiOS
Versions: FortiProxy 7.2.0-7.2.4, 7.0.0-7.0.10; FortiOS 7.2.0-7.2.4, 7.0.0-7.0.11, 6.4.0-6.4.12, 6.2.0-6.2.14
Operating Systems: Fortinet proprietary OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web management interface. Guest management feature must be accessible to the attacker.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could steal administrator session cookies, gain full administrative access to the firewall/proxy, modify configurations, create backdoor accounts, intercept network traffic, or pivot to internal networks.

🟠

Likely Case

Attackers with valid credentials could perform session hijacking, steal sensitive information from the management interface, or perform limited administrative actions depending on their privilege level.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the management interface itself without lateral movement capabilities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the web interface. The vulnerability is in the guest management settings page where crafted input is not properly sanitized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiProxy 7.2.5, 7.0.11; FortiOS 7.2.5, 7.0.12, 6.4.13, 6.2.15

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-23-106

Restart Required: Yes

Instructions:

1. Download the appropriate firmware version from Fortinet support portal. 2. Backup current configuration. 3. Upload and install the firmware update via web interface or CLI. 4. Reboot the device after installation. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to the management interface to trusted IP addresses only

config system interface
edit <interface_name>
set allowaccess https ssh ping
set trust-ip-1 <trusted_ip>
end

Disable Guest Management

all

Disable guest management feature if not required

config wireless-controller vap
edit <vap_name>
set schedule 'always'
set ssid 'disabled_ssid'
set schedule 'disable'
end

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces from user networks
  • Enforce multi-factor authentication for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via CLI: 'get system status' or web interface System > Dashboard. Compare against affected versions.

Check Version:

get system status | grep Version

Verify Fix Applied:

After patching, verify version is equal to or greater than: FortiProxy 7.2.5/7.0.11, FortiOS 7.2.5/7.0.12/6.4.13/6.2.15

📡 Detection & Monitoring

Log Indicators:

  • Unusual guest management configuration changes
  • Multiple failed login attempts followed by successful login
  • Administrative actions from unexpected user accounts or IPs

Network Indicators:

  • HTTP requests containing JavaScript payloads to guest management endpoints
  • Unusual outbound connections from management interface

SIEM Query:

source="fortigate" AND (url="*guest*" OR url="*vap*" OR url="*wireless*") AND (http_content="*script*" OR http_content="*javascript*" OR http_content="*onerror*" OR http_content="*onload*")

🔗 References

📤 Share & Export