Description
A use of externally-controlled format string in Fortinet FortiWeb version 7.0.0 through 7.0.1, FortiWeb 6.4 all versions allows attacker to execute unauthorized code or commands via specially crafted command arguments.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiWeb version 7.0.2 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27869 | A use of externally-controlled format string in Fortinet FortiWeb version 7.0.0 through 7.0.1, FortiWeb 6.4 all versions allows attacker to execute unauthorized code or commands via specially crafted command arguments. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-187 |
|
History
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:47:59.100Z
Reserved: 2023-01-18T08:30:21.308Z
Link: CVE-2023-23783
Updated: 2024-08-02T10:42:25.864Z
Status : Modified
Published: 2023-02-16T19:15:14.450
Modified: 2024-11-21T07:46:49.427
Link: CVE-2023-23783
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD