CVE-2022-30306

A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-22-167 Patch Vendor Advisory
https://fortiguard.com/psirt/FG-IR-22-167 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:7.0.1:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 6.6
References () https://fortiguard.com/psirt/FG-IR-22-167 - Patch, Vendor Advisory () https://fortiguard.com/psirt/FG-IR-22-167 - Patch, Vendor Advisory

Information

Published : 2023-02-16 19:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-30306

Mitre link : CVE-2022-30306

CVE.ORG link : CVE-2022-30306


JSON object : View

Products Affected

fortinet

  • fortiweb
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write