First published: Tue Aug 03 2021(Updated: )
An improper neutralization of special elements used in an OS Command vulnerability in FortiSandbox may allow an authenticated attacker with access to the web GUI to execute unauthorized code or commands via specifically crafted HTTP requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
FG-IR-20-198 is classified as a high severity vulnerability due to its potential to allow unauthorized code execution.
To remediate FG-IR-20-198, ensure that you update FortiSandbox to the latest firmware version provided by Fortinet.
Any authenticated user with access to the web GUI of FortiSandbox is potentially affected by FG-IR-20-198.
FG-IR-20-198 relates to an OS command injection attack that can be exploited via crafted HTTP requests.
FG-IR-20-198 requires authenticated access to the web GUI, thus it cannot be exploited remotely by unauthenticated users.