First published: Wed Dec 13 2023(Updated: )
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiTester | =2.3.0 | |
Fortinet FortiTester | =2.4.0 | |
Fortinet FortiTester | =2.4.1 | |
Fortinet FortiTester | =2.5.0 | |
Fortinet FortiTester | =2.6.0 | |
Fortinet FortiTester | =2.7.0 | |
Fortinet FortiTester | =2.8.0 | |
Fortinet FortiTester | =2.9.0 | |
Fortinet FortiTester | =3.0.0 | |
Fortinet FortiTester | =3.1.0 | |
Fortinet FortiTester | =3.2.0 | |
Fortinet FortiTester | =3.3.0 | |
Fortinet FortiTester | =3.3.1 | |
Fortinet FortiTester | =3.4.0 | |
Fortinet FortiTester | =3.5.0 | |
Fortinet FortiTester | =3.5.1 | |
Fortinet FortiTester | =3.6.0 | |
Fortinet FortiTester | =3.7.0 | |
Fortinet FortiTester | =3.7.1 | |
Fortinet FortiTester | =3.8.0 | |
Fortinet FortiTester | =3.9.0 | |
Fortinet FortiTester | =3.9.1 | |
Fortinet FortiTester | =3.9.2 | |
Fortinet FortiTester | =4.0.0 | |
Fortinet FortiTester | =4.1.0 | |
Fortinet FortiTester | =4.1.1 | |
Fortinet FortiTester | =4.2.0 | |
Fortinet FortiTester | =4.2.1 | |
Fortinet FortiTester | =7.0.0 | |
Fortinet FortiTester | =7.1.0 | |
Fortinet FortiTester | =7.1.1 | |
Fortinet FortiTester | =7.2.0 | |
Fortinet FortiTester | =7.2.1 | |
Fortinet FortiTester | =7.2.2 | |
Fortinet FortiTester | =7.2.3 |
Please upgrade to FortiTester version 7.3.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.