First published: Fri Mar 14 2025(Updated: )
An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability [CWE-89] in FortiWeb version 7.0.1 and below, 6.4.2 and below, 6.3.20 and below, 6.2.7 and below may allow a privileged attacker to execute SQL commands over the log database via specifically crafted strings parameters.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | <=7.0.1 | |
Fortinet FortiWeb | <=6.4.2 | |
Fortinet FortiWeb | <=6.3.20 | |
Fortinet FortiWeb | <=6.2.7 |
Upgrade to FortiWeb version 7.0.2 or above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29059 is classified as a critical vulnerability due to its potential for SQL Injection and unauthorized database access.
To fix CVE-2022-29059, upgrade FortiWeb to version 7.0.2 or above, 6.4.3 or higher, 6.3.21 or newer, or 6.2.8 or later.
CVE-2022-29059 is caused by improper neutralization of special elements in an SQL command, leading to potential SQL Injection vulnerabilities.
FortiWeb versions 7.0.1 and below, 6.4.2 and below, 6.3.20 and below, as well as 6.2.7 and below are affected by CVE-2022-29059.
A privileged attacker can exploit CVE-2022-29059 to execute unauthorized SQL commands on the log database.