CVE-2021-36195

Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-157 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-12-08 19:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-36195

Mitre link : CVE-2021-36195

CVE.ORG link : CVE-2021-36195


JSON object : View

Products Affected

fortinet

  • fortiweb
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')