CVE-2023-23781

A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:46

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.8
v2 : unknown
v3 : 6.4
References () https://fortiguard.com/psirt/FG-IR-22-151 - Vendor Advisory () https://fortiguard.com/psirt/FG-IR-22-151 - Vendor Advisory

07 Nov 2023, 04:07

Type Values Removed Values Added
Summary A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files. A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files.

Information

Published : 2023-02-16 19:15

Updated : 2024-11-21 07:46


NVD link : CVE-2023-23781

Mitre link : CVE-2023-23781

CVE.ORG link : CVE-2023-23781


JSON object : View

Products Affected

fortinet

  • fortiweb
CWE
CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write