First published: Wed Dec 08 2021(Updated: )
Multiple command injection vulnerabilities in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 may allow an authenticated attacker to execute arbitrary commands on the underlying system shell via specially crafted command arguments.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.2.0<=6.2.5 | |
Fortinet FortiWeb | >=6.3.0<=6.3.15 | |
Fortinet FortiWeb | =6.1.0 | |
Fortinet FortiWeb | =6.1.1 | |
Fortinet FortiWeb | =6.1.2 | |
Fortinet FortiWeb | =6.4.0 | |
Fortinet FortiWeb | =6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-36195 is a vulnerability in the command line interpreter of FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 that allows an authenticated attacker to execute arbitrary commands on the underlying system shell.
CVE-2021-36195 has a severity score of 8.8 which is classified as critical.
An attacker can exploit CVE-2021-36195 by sending specially crafted commands to the command line interpreter of FortiWeb.
FortiWeb versions 6.4.1, 6.4.0, 6.3.0 through 6.3.15, 6.2.0 through 6.2.6, and 6.1.0 through 6.1.2 are affected by CVE-2021-36195.
Yes, it is recommended to upgrade to a fixed version of FortiWeb. Please refer to the Fortinet advisory for more information.