CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
59.5%
AnΒ improper neutralization of special elements used in an os command (βOS Command Injectionβ) [CWE-78] in FortiWeb 7.0.0 through 7.0.1, 6.3.0 through 6.3.19, 6.4 all versions may allow an authenticated attacker to execute arbitrary shell code as root
user via crafted HTTP requests.
Vendor | Product | Version | CPE |
---|---|---|---|
fortinet | fortiweb | * | cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* |
fortinet | fortiweb | 6.4.0 | cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:* |
fortinet | fortiweb | 6.4.1 | cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:* |
fortinet | fortiweb | 6.4.2 | cpe:2.3:a:fortinet:fortiweb:6.4.2:*:*:*:*:*:*:* |
fortinet | fortiweb | 7.0.0 | cpe:2.3:a:fortinet:fortiweb:7.0.0:*:*:*:*:*:*:* |
fortinet | fortiweb | 7.0.1 | cpe:2.3:a:fortinet:fortiweb:7.0.1:*:*:*:*:*:*:* |
[
{
"vendor": "Fortinet",
"product": "FortiWeb",
"defaultStatus": "unaffected",
"versions": [
{
"versionType": "semver",
"version": "7.0.0",
"lessThanOrEqual": "7.0.1",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.4.0",
"lessThanOrEqual": "6.4.2",
"status": "affected"
},
{
"versionType": "semver",
"version": "6.3.0",
"lessThanOrEqual": "6.3.19",
"status": "affected"
}
]
}
]