First published: Tue Mar 11 2025(Updated: )
An improper handling of syntactically invalid structure in Fortinet FortiWeb at least verions 7.4.0 through 7.4.6 and 7.2.0 through 7.2.10 and 7.0.0 through 7.0.10 allows attacker to execute unauthorized code or commands via HTTP/S crafted requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=7.4.0<=7.4.6>=7.2.0<=7.2.10>=7.0.0<=7.0.10 |
Please upgrade to FortiWeb version 7.6.0 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-42784 has been classified as a critical vulnerability due to its potential to allow unauthorized remote code execution.
To fix CVE-2023-42784, upgrade Fortinet FortiWeb to a version later than 7.4.6, 7.2.10, or 7.0.10.
CVE-2023-42784 affects Fortinet FortiWeb versions 7.0.0 to 7.0.10, 7.2.0 to 7.2.10, and 7.4.0 to 7.4.6.
CVE-2023-42784 can be exploited through specially crafted HTTP/S requests, potentially allowing attackers to execute unauthorized commands.
There are no recommended workarounds for CVE-2023-42784; the only mitigation is to apply the available software updates.