First published: Tue Feb 11 2025(Updated: )
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWeb 7.0.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted input.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=7.0.0<=7.6.0 |
Please upgrade to FortiWeb version 7.6.1 or above Please upgrade to FortiWeb version 7.4.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50569 is rated as critical due to its potential for unauthorized code execution.
To fix CVE-2024-50569, upgrade Fortinet FortiWeb to version 7.6.1 or later.
CVE-2024-50569 affects Fortinet FortiWeb versions 7.0.0 through 7.6.0.
CVE-2024-50569 can be exploited for OS command injection, allowing attackers to execute unauthorized commands.
There are no recommended workarounds for CVE-2024-50569; updating the software is the only secure solution.