Lucene search

K
vulnrichmentFortinetVULNRICHMENT:CVE-2023-36642
HistorySep 13, 2023 - 12:29 p.m.

CVE-2023-36642

2023-09-1312:29:26
CWE-77
fortinet
github.com
os command
fortitester
authenticated attacker
unauthorized commands
cwe-78
cve-2023-36642

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RC:C

AI Score

7.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

An improper neutralization of special elements used in an OS command vulnerability [CWE-78]Β in the management interface of FortiTester 3.0.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:fortinet:fortitester:*:*:*:*:*:*:*:*"
    ],
    "vendor": "fortinet",
    "product": "fortitester",
    "versions": [
      {
        "status": "affected",
        "version": "3.0.0",
        "versionType": "custom",
        "lessThanOrEqual": "7.2.3"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.7

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RC:C

AI Score

7.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-36642