Home

Description

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.0.0 through 7.0.3, 5.3.2, 4.2.4 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests.

PUBLISHED Reserved 2022-03-21 | Published 2023-02-16 | Updated 2024-10-23 | Assigner fortinet




HIGH: 7.0CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:U/RC:C

Problem types

Execute unauthorized code or commands

Product status

Default status
unaffected

7.0.0 (semver)
affected

5.3.2
affected

4.2.0 (semver)
affected

4.1.1 (semver)
affected

4.0.0 (semver)
affected

3.3.0 (semver)
affected

3.2.1 (semver)
affected

3.1.0 (semver)
affected

3.0.0 (semver)
affected

References

fortiguard.com/psirt/FG-IR-22-048

fortiguard.com/psirt/FG-IR-22-048

cve.org (CVE-2022-27489)

nvd.nist.gov (CVE-2022-27489)

Download JSON