Описание
A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 6.3.6 (включая) до 6.3.20 (исключая)
Одно из
cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:6.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiweb:7.0.1:*:*:*:*:*:*:*
EPSS
Процентиль: 61%
0.00417
Низкий
6.6 Medium
CVSS3
8.8 High
CVSS3
Дефекты
CWE-121
CWE-787
Связанные уязвимости
CVSS3: 8.8
github
почти 3 года назад
A stack-based buffer overflow vulnerability [CWE-121] in the CA sign functionality of FortiWeb version 7.0.1 and below, 6.4 all versions, version 6.3.19 and below may allow an authenticated attacker to achieve arbitrary code execution via specifically crafted password.
EPSS
Процентиль: 61%
0.00417
Низкий
6.6 Medium
CVSS3
8.8 High
CVSS3
Дефекты
CWE-121
CWE-787