Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gffv-9cg4-8hh4

Опубликовано: 11 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.

A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.

EPSS

Процентиль: 27%
0.00098
Низкий

7.2 High

CVSS3

Дефекты

CWE-134

Связанные уязвимости

CVSS3: 7.2
nvd
11 месяцев назад

A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands.

CVSS3: 7.2
fstec
11 месяцев назад

Уязвимость компонента GUI операционной системы FortiOS, прокси-сервера для защиты от интернет-атак FortiProxy, системы управления учетными данными FortiPAM, межсетевого экрана веб-приложений FortiWeb и программного обеспечения для безопасного удаленного доступа FortiSRA, позволяющая нарушителю выполнить произвольный код или команды

EPSS

Процентиль: 27%
0.00098
Низкий

7.2 High

CVSS3

Дефекты

CWE-134