First published: Tue Oct 10 2023(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLM MEA for FortiManager | >=8.5.0<=8.5.4 | |
Fortinet FortiWLM MEA for FortiManager | >=8.6.0<=8.6.5 |
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-34987.
The title of this vulnerability is 'A improper neutralization of special elements used in an os command ( os command injection ) in Fortinet FortiWLM.'
The severity of CVE-2023-34987 is high (8.8).
CVE-2023-34987 affects Fortinet FortiWLM versions 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4.
An attacker can exploit CVE-2023-34987 by executing unauthorized code or commands via specially crafted HTTP get request parameters.