CVE-2023-48782

A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters
References
Link Resource
https://fortiguard.com/psirt/FG-IR-23-450 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*

History

15 Dec 2023, 20:01

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*
First Time Fortinet fortiwlm
Fortinet
References () https://fortiguard.com/psirt/FG-IR-23-450 - () https://fortiguard.com/psirt/FG-IR-23-450 - Vendor Advisory

13 Dec 2023, 13:35

Type Values Removed Values Added
Summary
  • (es) Una neutralización inadecuada de elementos especiales utilizados en un comando del sistema operativo ('inyección de comando del sistema operativo') en Fortinet FortiWLM versión 8.6.0 a 8.6.5 permite al atacante ejecutar código o comandos no autorizados a través de parámetros de solicitud http get específicamente manipulados

13 Dec 2023, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 07:15

Updated : 2023-12-15 20:01


NVD link : CVE-2023-48782

Mitre link : CVE-2023-48782

CVE.ORG link : CVE-2023-48782


JSON object : View

Products Affected

fortinet

  • fortiwlm
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')