CVE-2022-33870

An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 3.0.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-22-070 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:*

History

04 Nov 2022, 13:42

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:*
References (CONFIRM) https://fortiguard.com/psirt/FG-IR-22-070 - (CONFIRM) https://fortiguard.com/psirt/FG-IR-22-070 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Fortinet fortitester
Fortinet
CWE CWE-78

02 Nov 2022, 13:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-11-02 12:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-33870

Mitre link : CVE-2022-33870

CVE.ORG link : CVE-2022-33870


JSON object : View

Products Affected

fortinet

  • fortitester
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')