First published: Thu Feb 16 2023(Updated: )
A stack-based buffer overflow vulnerability [CWE-121] in FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below SAML server configuration may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.3.0<6.3.20 | |
Fortinet FortiWeb | >=6.4.0<=6.4.2 | |
Fortinet FortiWeb | >=7.0.0<7.0.2 |
Please upgrade to FortiWeb version 7.0.2 or above Please upgrade to FortiWeb version 6.3.20 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23781 is a stack-based buffer overflow vulnerability in FortiWeb versions 7.0.1 and below, 6.4 all versions, and version 6.3.19 and below SAML server configuration.
The severity of CVE-2023-23781 is high, with a severity value of 8.8.
CVE-2023-23781 allows an authenticated attacker to achieve arbitrary code execution via specifically crafted XML files.
FortiWeb versions 7.0.1 and below, 6.4 all versions, and version 6.3.19 and below SAML server configuration are affected by CVE-2023-23781.
To mitigate CVE-2023-23781, it is recommended to update FortiWeb to a version that is not affected by the vulnerability.