First published: Tue Aug 03 2021(Updated: )
An improper neutralization of special elements used in an OS Command vulnerability in FortiSandbox 3.2.0 through 3.2.2, 3.1.0 through 3.1.4, and 3.0.0 through 3.0.6 may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | <3.0.7 | |
Fortinet FortiSandbox | >=3.1.0<3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<3.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-26097 is an OS Command vulnerability in FortiSandbox 3.0.0 through 3.2.2, allowing an attacker to execute unauthorized code or commands through crafted HTTP requests.
CVE-2021-26097 has a severity score of 8.8 (high).
FortiSandbox versions 3.0.0 through 3.2.2 are affected by CVE-2021-26097.
An authenticated attacker with access to the web GUI can exploit CVE-2021-26097 by sending specially crafted HTTP requests.
Yes, it is recommended to update FortiSandbox to version 3.2.3 or higher to mitigate the vulnerability.