A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-167 | Patch Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-22-167 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.6 |
References | () https://fortiguard.com/psirt/FG-IR-22-167 - Patch, Vendor Advisory |
Information
Published : 2023-02-16 19:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30306
Mitre link : CVE-2022-30306
CVE.ORG link : CVE-2022-30306
JSON object : View
Products Affected
fortinet
- fortiweb