An improper neutralization of special elements used in an OS Command vulnerability in FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6 may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted HTTP requests.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-20-198 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Aug 2021, 23:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://fortiguard.com/advisory/FG-IR-20-198 - Vendor Advisory | |
CWE | CWE-78 | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 8.8 |
04 Aug 2021, 16:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-04 16:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-26097
Mitre link : CVE-2021-26097
CVE.ORG link : CVE-2021-26097
JSON object : View
Products Affected
fortinet
- fortisandbox
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')