CVE-2021-36195

Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments.
References
Link Resource
https://fortiguard.com/advisory/FG-IR-21-157 Patch Vendor Advisory
https://fortiguard.com/advisory/FG-IR-21-157 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.1.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () https://fortiguard.com/advisory/FG-IR-21-157 - Patch, Vendor Advisory () https://fortiguard.com/advisory/FG-IR-21-157 - Patch, Vendor Advisory
CVSS v2 : 9.0
v3 : 8.8
v2 : 9.0
v3 : 4.2

Information

Published : 2021-12-08 19:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36195

Mitre link : CVE-2021-36195

CVE.ORG link : CVE-2021-36195


JSON object : View

Products Affected

fortinet

  • fortiweb
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')