Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rhfj-295m-9hhj

Опубликовано: 13 дек. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, FortiOS versions 7.4.0, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiPAM versions 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted API requests.

A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, FortiOS versions 7.4.0, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiPAM versions 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted API requests.

EPSS

Процентиль: 40%
0.0018
Низкий

7.2 High

CVSS3

Дефекты

CWE-134

Связанные уязвимости

CVSS3: 7.2
nvd
около 2 лет назад

A use of externally-controlled format string in Fortinet FortiProxy versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.10, FortiOS versions 7.4.0, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.12, 6.2.0 through 6.2.15, 6.0.0 through 6.0.17, FortiPAM versions 1.0.0 through 1.0.3 allows attacker to execute unauthorized code or commands via specially crafted API requests.

CVSS3: 7.2
fstec
около 2 лет назад

Уязвимость демона HTTPSd операционных систем FortiOS, прокси-сервера для защиты от интернет-атак FortiProxy и системы управления учетными данными FortiPAM, позволяющая нарушителю выполнить произвольный код или произвольные команды

EPSS

Процентиль: 40%
0.0018
Низкий

7.2 High

CVSS3

Дефекты

CWE-134