First published: Thu Feb 16 2023(Updated: )
A use of externally-controlled format string in Fortinet FortiWeb version 7.0.0 through 7.0.1, FortiWeb 6.4 all versions allows attacker to execute unauthorized code or commands via specially crafted command arguments.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.4.0<6.4.2 | |
Fortinet FortiWeb | >=7.0.0<7.0.2 |
Please upgrade to FortiWeb version 7.0.2 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2023-23783.
The severity of CVE-2023-23783 is high, with a severity value of 7.8.
Fortinet FortiWeb version 7.0.0 through 7.0.1, and all versions of FortiWeb 6.4 up to 6.4.2 are affected by CVE-2023-23783.
CVE-2023-23783 allows an attacker to execute unauthorized code or commands via specially crafted command arguments.
A fix is available for CVE-2023-23783, and users are advised to update to the latest version of Fortinet FortiWeb.