{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2019-15706","assignerOrgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","state":"PUBLISHED","assignerShortName":"fortinet","dateReserved":"2019-08-27T00:00:00.000Z","datePublished":"2025-03-17T13:05:08.965Z","dateUpdated":"2025-03-17T13:53:31.962Z"},"containers":{"cna":{"affected":[{"vendor":"Fortinet","product":"FortiProxy","cpes":[],"defaultStatus":"unaffected","versions":[{"version":"2.0.0","status":"affected"},{"versionType":"semver","version":"1.2.0","lessThanOrEqual":"1.2.9","status":"affected"}]},{"vendor":"Fortinet","product":"FortiOS","cpes":["cpe:2.3:o:fortinet:fortios:6.2.1:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.2.0:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.8:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.7:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.6:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.5:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.4:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.3:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.2:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.1:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:6.0.0:*:*:*:*:*:*:*","cpe:2.3:o:fortinet:fortios:5.6.12:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"versionType":"semver","version":"6.2.0","lessThanOrEqual":"6.2.1","status":"affected"},{"versionType":"semver","version":"6.0.0","lessThanOrEqual":"6.0.8","status":"affected"},{"version":"5.6.12","status":"affected"}]}],"descriptions":[{"lang":"en","value":"An improper neutralization of input during web page generation in the SSL VPN portal of FortiProxy version 2.0.0, version 1.2.9 and below and FortiOS version 6.2.1 and below, version 6.0.8 and below, version 5.6.12 may allow a remote authenticated attacker to perform a stored cross site scripting attack (XSS)."}],"providerMetadata":{"orgId":"6abe59d8-c742-4dff-8ce8-9b0ca1073da8","shortName":"fortinet","dateUpdated":"2025-03-17T13:05:08.965Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-79","description":"Execute unauthorized code or commands","type":"CWE"}]}],"metrics":[{"format":"CVSS","cvssV3_1":{"version":"3.1","attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N/E:F/RL:X/RC:X"}}],"solutions":[{"lang":"en","value":"Please upgrade to FortiProxy version 2.0.1 or above. Please upgrade to FortiProxy version 1.2.10 or above."}],"references":[{"name":"https://fortiguard.fortinet.com/psirt/FG-IR-19-223","url":"https://fortiguard.fortinet.com/psirt/FG-IR-19-223"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-17T13:53:23.673713Z","id":"CVE-2019-15706","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-17T13:53:31.962Z"}}]}}