First published: Tue Feb 11 2025(Updated: )
An improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.4.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted input.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=7.4.0<=7.6.0 |
Please upgrade to FortiWeb version 7.6.1 or above Please upgrade to FortiWeb version 7.4.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50567 is rated as a critical severity vulnerability due to its potential for unauthorized code execution.
To fix CVE-2024-50567, upgrade Fortinet FortiWeb to version 7.6.1 or later to patch the vulnerability.
CVE-2024-50567 affects Fortinet FortiWeb versions 7.4.0 to 7.6.0 inclusively.
CVE-2024-50567 enables an attacker to perform OS command injection, allowing execution of unauthorized commands.
There are no known effective workarounds for CVE-2024-50567, so upgrading to a secure version is recommended.