First published: Thu Feb 16 2023(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiExtender 7.0.0 through 7.0.3, 5.3.2, 4.2.4 and below allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Fortiextender Firmware | >=3.2.1<3.2.4 | |
Fortinet Fortiextender Firmware | >=4.1.1<4.1.9 | |
Fortinet Fortiextender Firmware | >=4.2.0<4.2.5 | |
Fortinet Fortiextender Firmware | >=7.0.0<7.0.4 | |
Fortinet Fortiextender Firmware | =3.0.0 | |
Fortinet Fortiextender Firmware | =3.0.1 | |
Fortinet Fortiextender Firmware | =3.0.2 | |
Fortinet Fortiextender Firmware | =3.1.0 | |
Fortinet Fortiextender Firmware | =3.1.1 | |
Fortinet Fortiextender Firmware | =5.3.2 | |
Fortinet FortiExtender |
Upgrade to FortiExtender version 7.2.0 and above Upgrade to FortiExtender version 7.0.4 and above Upgrade to FortiExtender upcoming version 4.2.5 and above Upgrade to FortiExtender upcoming version 4.1.9 and above Upgrade to FortiExtender upcoming version 4.0.3 and above Upgrade to FortiExtender version 3.3.3 and above Upgrade to FortiExtender version 3.2.4 and above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-27489 is considered a high severity vulnerability due to its potential for code execution by unauthorized attackers.
To fix CVE-2022-27489, upgrade your Fortinet FortiExtender firmware to a patched version provided by Fortinet.
CVE-2022-27489 affects Fortinet FortiExtender firmware versions 7.0.0 through 7.0.3, 5.3.2, and 4.2.4 and below.
CVE-2022-27489 allows attackers to perform OS command injection, enabling them to execute unauthorized commands via crafted HTTP requests.
A recommended workaround for CVE-2022-27489 is to implement strict input validation rules to mitigate unauthorized command execution.