Overview
- Description
- A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted HTTP get request parameters.
- Source
- psirt@fortinet.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "929F1380-4410-466D-9203-62414DC7A39E", "versionEndIncluding": "8.5.4", "versionStartIncluding": "8.5.0" }, { "criteria": "cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCEDF5B8-C922-48DD-926D-788A53ACD684", "versionEndIncluding": "8.6.5", "versionStartIncluding": "8.6.0" } ], "operator": "OR" } ] } ]