Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wwc6-cvf7-4mc4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A use of hard-coded credentials (CWE-798) vulnerability in FortiPortal versions 5.2.5 and below, 5.3.5 and below, 6.0.4 and below, versions 5.1.x and 5.0.x may allow a remote and unauthenticated attacker to execute unauthorized commands as root by uploading and deploying malicious web application archive files using the default hard-coded Tomcat Manager username and password.

A use of hard-coded credentials (CWE-798) vulnerability in FortiPortal versions 5.2.5 and below, 5.3.5 and below, 6.0.4 and below, versions 5.1.x and 5.0.x may allow a remote and unauthenticated attacker to execute unauthorized commands as root by uploading and deploying malicious web application archive files using the default hard-coded Tomcat Manager username and password.

EPSS

Процентиль: 97%
0.31045
Средний

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

A use of hard-coded credentials (CWE-798) vulnerability in FortiPortal versions 5.2.5 and below, 5.3.5 and below, 6.0.4 and below, versions 5.1.x and 5.0.x may allow a remote and unauthenticated attacker to execute unauthorized commands as root by uploading and deploying malicious web application archive files using the default hard-coded Tomcat Manager username and password.

CVSS3: 10
fstec
больше 4 лет назад

Уязвимость инструмента аналитики и управления безопасностью Fortinet FortiPortal, связанная с жёстким кодированием регистрационных данных, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 97%
0.31045
Средний

Дефекты

CWE-798