First published: Wed Sep 08 2021(Updated: )
A Improper neutralization of special elements used in a command ('Command Injection') in Fortinet FortiWeb version 6.3.13 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | <=6.2.4 | |
Fortinet FortiWeb | >=6.3.0<6.3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36182 is rated as high severity due to the potential for unauthorized code execution.
To fix CVE-2021-36182, upgrade Fortinet FortiWeb to version 6.3.14 or later.
CVE-2021-36182 can allow attackers to execute arbitrary commands on the affected Fortinet FortiWeb instances.
Versions of Fortinet FortiWeb from 6.2.4 and below, as well as those from 6.3.0 to 6.3.13, are affected by CVE-2021-36182.
CVE-2021-36182 is a notable vulnerability within the Fortinet FortiWeb software, emphasizing the importance of regular security updates.