First published: Wed Feb 02 2022(Updated: )
Multiple stack-based buffer overflows in the command line interpreter of FortiWeb before 6.4.2 may allow an authenticated attacker to achieve arbitrary code execution via specially crafted commands.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=5.0.0<6.2.6 | |
Fortinet FortiWeb | >=6.3.0<6.3.16 | |
Fortinet FortiWeb | >=6.4.0<6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this FortiWeb vulnerability is CVE-2021-36193.
The severity of CVE-2021-36193 is high with a severity value of 7.2.
FortiWeb versions between 5.0.0 and 6.2.6, between 6.3.0 and 6.3.16, and between 6.4.0 and 6.4.2 are affected by CVE-2021-36193.
An authenticated attacker can achieve arbitrary code execution by exploiting multiple stack-based buffer overflows in the command line interpreter of FortiWeb before 6.4.2 using specially crafted commands.
You can find more information about CVE-2021-36193 on the FortiGuard Advisory FG-IR-21-132.