First published: Wed Dec 13 2023(Updated: )
An improper neutralization of special elements used in a command ('Command Injection') vulnerability [CWE-77] in FortiPortal version 7.2.0, version 7.0.6 and below may allow a remote authenticated attacker with at least R/W permission to execute unauthorized commands via specifically crafted arguments in the Schedule System Backup page field.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiPortal | >=7.0.0<=7.0.6 | |
Fortinet FortiPortal | =7.2.0 |
Please upgrade to FortiPortal version 7.2.1 or above Please upgrade to FortiPortal version 7.0.7 or above Please upgrade to FortiPortal version 6.0.15 or above Please upgrade to FortiPortal version 5.3.9 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48791 is classified as a high severity vulnerability due to its potential for command injection.
To fix CVE-2023-48791, it is recommended to update FortiPortal to version 7.2.1 or higher, or to a patched version beyond 7.0.6.
CVE-2023-48791 affects FortiPortal versions 7.0.6 and below, as well as version 7.2.0.
CVE-2023-48791 is a command injection vulnerability that allows unauthorized command execution.
CVE-2023-48791 could allow remote authenticated attackers to execute arbitrary commands on the affected FortiPortal systems.