First published: Thu Feb 16 2023(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.0.0 through 7.0.3, 5.3.2, 4.2.4 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiextender Firmware | >=3.2.1<3.2.4 | |
Fortinet Fortiextender Firmware | >=4.1.1<4.1.9 | |
Fortinet Fortiextender Firmware | >=4.2.0<4.2.5 | |
Fortinet Fortiextender Firmware | >=7.0.0<7.0.4 | |
Fortinet Fortiextender Firmware | =3.0.0 | |
Fortinet Fortiextender Firmware | =3.0.1 | |
Fortinet Fortiextender Firmware | =3.0.2 | |
Fortinet Fortiextender Firmware | =3.1.0 | |
Fortinet Fortiextender Firmware | =3.1.1 | |
Fortinet Fortiextender Firmware | =5.3.2 | |
Fortinet FortiExtender |
Upgrade to FortiExtender version 7.2.0 and above Upgrade to FortiExtender version 7.0.4 and above Upgrade to FortiExtender upcoming version 4.2.5 and above Upgrade to FortiExtender upcoming version 4.1.9 and above Upgrade to FortiExtender upcoming version 4.0.3 and above Upgrade to FortiExtender version 3.3.3 and above Upgrade to FortiExtender version 3.2.4 and above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.