Description
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-40497 | A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-140 |
|
History
Thu, 19 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-09-19T19:18:15.075Z
Reserved: 2023-06-23T14:57:30.033Z
Link: CVE-2023-36550
Updated: 2024-08-02T16:52:53.554Z
Status : Modified
Published: 2023-10-10T17:15:12.017
Modified: 2024-11-21T08:09:54.943
Link: CVE-2023-36550
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD