Description
A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiWeb version 7.0.2 or above Please upgrade to FortiWeb version 6.3.20 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27867 | A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-151 |
|
History
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:47:34.620Z
Reserved: 2023-01-18T08:30:21.308Z
Link: CVE-2023-23781
Updated: 2024-08-02T10:42:26.150Z
Status : Modified
Published: 2023-02-16T19:15:14.317
Modified: 2024-11-21T07:46:49.160
Link: CVE-2023-23781
No data.
OpenCVE Enrichment
No data.
EUVD