A use of hard-coded credentials (CWE-798) vulnerability in FortiPortal versions 5.2.5 and below, 5.3.5 and below, 6.0.4 and below, versions 5.1.x and 5.0.x may allow a remote and unauthenticated attacker to execute unauthorized commands as root by uploading and deploying malicious web application archive files using the default hard-coded Tomcat Manager username and password.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-077 | Third Party Advisory |
https://fortiguard.com/advisory/FG-IR-21-077 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/advisory/FG-IR-21-077 - Third Party Advisory |
26 Aug 2021, 01:40
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-798 | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CPE | cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:* | |
References | (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-077 - Third Party Advisory |
18 Aug 2021, 22:29
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-18 22:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32588
Mitre link : CVE-2021-32588
CVE.ORG link : CVE-2021-32588
JSON object : View
Products Affected
fortinet
- fortiportal
CWE
CWE-798
Use of Hard-coded Credentials