A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager version 7.0.0 through 7.0.3, 6.4.0 through 6.4.7, 6.2.x and 6.0.x and FortiAnalyzer version 7.0.0 through 7.0.3, version 6.4.0 through 6.4.7, 6.2.x and 6.0.x allows attacker to execute arbitrary shell code as `root` user via `diagnose system` CLI commands.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-049 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Jul 2022, 07:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://fortiguard.com/psirt/FG-IR-22-049 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CWE | CWE-78 |
19 Jul 2022, 15:11
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-07-19 14:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-27483
Mitre link : CVE-2022-27483
CVE.ORG link : CVE-2022-27483
JSON object : View
Products Affected
fortinet
- fortianalyzer
- fortimanager
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')