OS Command Injection Vulnerability in FortiWeb by Fortinet
CVE-2021-22123
Key Information:
- Vendor
- Fortinet
- Status
- Vendor
- CVE Published:
- 1 June 2021
Badges
Summary
FortiWeb's management interface exhibits an OS command injection vulnerability, allowing remote authenticated attackers to execute arbitrary commands on affected systems. This exploit targets the SAML server configuration page, where improper validation can enable an attacker to manipulate backend commands, potentially compromising the entire system. Users of FortiWeb versions 6.3.7 and below, along with earlier versions 6.2.3, 6.1.x, 6.0.x, and 5.9.x, should take immediate actions to patch their systems as per the advisory provided by Fortinet.
Affected Version(s)
Fortinet FortiWeb FortiWeb 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved