First published: Wed Feb 02 2022(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.2.0<6.2.7 | |
Fortinet FortiWeb | >=6.3.0<6.3.16 | |
Fortinet FortiWeb | >=6.4.0<6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2021-41018.
The severity of CVE-2021-41018 is critical (8.8).
The affected software is Fortinet FortiWeb versions 6.4.1 and below, 6.3.15 and below, and 6.2.7 to 6.2.0.
CVE-2021-41018 allows an attacker to execute unauthorized code or commands by injecting them into crafted HTTP requests.
Yes, a fix is available for CVE-2021-41018. Please refer to the Fortinet advisory at https://fortiguard.com/advisory/FG-IR-21-166 for more information.