Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-157 | Patch Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-21-157 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/advisory/FG-IR-21-157 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 9.0
v3 : 4.2 |
Information
Published : 2021-12-08 19:15
Updated : 2024-11-21 06:13
NVD link : CVE-2021-36195
Mitre link : CVE-2021-36195
CVE.ORG link : CVE-2021-36195
JSON object : View
Products Affected
fortinet
- fortiweb
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')