Lucene search

K
nvd[email protected]NVD:CVE-2023-34991
HistoryNov 14, 2023 - 6:15 p.m.

CVE-2023-34991

2023-11-1418:15:30
CWE-89
web.nvd.nist.gov
fortinet fortiwlm
sql injection
unauthorized code execution
crafted http requests

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.3%

A improper neutralization of special elements used in an sql command (‘sql injection’) in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.0 through 8.4.2 and 8.3.0 through 8.3.2 and 8.2.2 allows attacker to execute unauthorized code or commands via a crafted http request.

Affected configurations

NVD
Node
fortinetfortiwlmRange8.5.08.5.4
OR
fortinetfortiwlmRange8.6.08.6.5
OR
fortinetfortiwlmMatch8.2.2
OR
fortinetfortiwlmMatch8.3.0
OR
fortinetfortiwlmMatch8.3.1
OR
fortinetfortiwlmMatch8.3.2
OR
fortinetfortiwlmMatch8.4.0
OR
fortinetfortiwlmMatch8.4.1
OR
fortinetfortiwlmMatch8.4.2

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.3%

Related for NVD:CVE-2023-34991