First published: Tue Oct 10 2023(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLM | >=8.5.0<=8.5.4 | |
Fortinet FortiWLM | >=8.6.0<=8.6.5 |
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-34988.
The severity of CVE-2023-34988 is high with a CVSS score of 8.8.
Fortinet FortiWLM versions 8.5.0 through 8.5.4 and 8.6.0 through 8.6.5 are affected by CVE-2023-34988.
An attacker can exploit CVE-2023-34988 by sending specifically crafted HTTP get request parameters to execute unauthorized code or commands.
To mitigate CVE-2023-34988, it is recommended to update to a version of Fortinet FortiWLM that is not affected by this vulnerability.