cve-2023-40716
Vulnerability from cvelistv5
Published
2023-12-13 06:44
Modified
2024-08-02 18:38
Summary
An improper neutralization of special elements used in an OS command vulnerability [CWE-78]  in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .
Impacted products
FortinetFortiTester
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T18:38:51.171Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://fortiguard.com/psirt/FG-IR-22-345",
            "tags": [
              "x_transferred"
            ],
            "url": "https://fortiguard.com/psirt/FG-IR-22-345"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "FortiTester",
          "vendor": "Fortinet",
          "versions": [
            {
              "lessThanOrEqual": "7.2.3",
              "status": "affected",
              "version": "7.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "7.1.1",
              "status": "affected",
              "version": "7.1.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "7.0.0"
            },
            {
              "lessThanOrEqual": "4.2.1",
              "status": "affected",
              "version": "4.2.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "4.1.1",
              "status": "affected",
              "version": "4.1.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "4.0.0"
            },
            {
              "lessThanOrEqual": "3.9.2",
              "status": "affected",
              "version": "3.9.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "3.8.0"
            },
            {
              "lessThanOrEqual": "3.7.1",
              "status": "affected",
              "version": "3.7.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "3.6.0"
            },
            {
              "lessThanOrEqual": "3.5.1",
              "status": "affected",
              "version": "3.5.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "3.4.0"
            },
            {
              "lessThanOrEqual": "3.3.1",
              "status": "affected",
              "version": "3.3.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "3.2.0"
            },
            {
              "status": "affected",
              "version": "3.1.0"
            },
            {
              "status": "affected",
              "version": "3.0.0"
            },
            {
              "status": "affected",
              "version": "2.9.0"
            },
            {
              "status": "affected",
              "version": "2.8.0"
            },
            {
              "status": "affected",
              "version": "2.7.0"
            },
            {
              "status": "affected",
              "version": "2.6.0"
            },
            {
              "status": "affected",
              "version": "2.5.0"
            },
            {
              "lessThanOrEqual": "2.4.1",
              "status": "affected",
              "version": "2.4.0",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.3.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An improper neutralization of special elements used in an OS command vulnerability [CWE-78] \u00a0in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup ."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "Execute unauthorized code or commands",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-13T06:44:03.852Z",
        "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
        "shortName": "fortinet"
      },
      "references": [
        {
          "name": "https://fortiguard.com/psirt/FG-IR-22-345",
          "url": "https://fortiguard.com/psirt/FG-IR-22-345"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Please upgrade to FortiTester version 7.3.0 or above \n"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
    "assignerShortName": "fortinet",
    "cveId": "CVE-2023-40716",
    "datePublished": "2023-12-13T06:44:03.852Z",
    "dateReserved": "2023-08-21T09:03:44.315Z",
    "dateUpdated": "2024-08-02T18:38:51.171Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-40716\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2023-12-13T07:15:14.223\",\"lastModified\":\"2023-12-15T19:06:24.823\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An improper neutralization of special elements used in an OS command vulnerability [CWE-78] \u00a0in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .\"},{\"lang\":\"es\",\"value\":\"Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando del sistema operativo [CWE-78] en el int\u00e9rprete de l\u00ednea de comando de FortiTester 2.3.0 a 7.2.3 puede permitir que un atacante autenticado ejecute comandos no autorizados a trav\u00e9s de argumentos espec\u00edficamente manipulados al ejecutar ejecutar restauraci\u00f3n/copia de seguridad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20DC6A76-A91E-49D8-AD5F-5A53E6FD56A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835CFB56-B366-44F2-BC0D-797973E29341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05D6DD1E-24F5-49C4-9BAF-2E4FA682F41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A59274-C7AE-456B-821A-4A41DAE51DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF739FA1-C8A1-4CCD-BCA4-1A9ABD31D926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71DF1A6A-B574-48E7-9337-A986EAD45441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B23B49A-6BEF-4662-A19A-AA53B6A61913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F632D17B-0864-4965-92CD-7B58CB88506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98433F67-056E-4371-B482-93A2EBF0C237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8609203-C2ED-4821-A836-E81479406B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0E475B-5CDF-40DB-A923-5DEB093D246E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C93812-ED30-40EC-81C2-159D2095A8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61C7F802-1490-467A-B5B6-0B2AFD468439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CB9729-BCDE-41F4-8684-01FF62794E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED9A5FF-B3A5-4DA8-AF7E-7B6C107A6C02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8CCDEF0-9026-4F67-95B1-07286EFBB370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC82DC7-5C3C-452A-BB1D-021D935851EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A75B9A-D1A1-4E6A-84C7-1701DE00C8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2934396-D757-4079-A5D7-65133CF833DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83A5237C-C126-4AEA-8CE8-DEC82DDEC69D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14C2E2DA-6CE2-4B5E-A6CB-029967EAAFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492036BF-130B-435B-9EDD-71732CD663A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB540E8-5B68-4F20-970E-63B70FFA3C83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A3ABD7-9694-4784-9CD4-E8A1FA715682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79982C9-CB89-41B9-A294-B9830897304A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB327AD-00E1-4397-B992-E182785E8ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E47F051E-5D15-456D-9C0D-1AE6FF347155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32E37C0-6ABE-46D2-987B-EC5E7F6BEF75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90D54E79-62C6-427F-9DD1-B3A99944E418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48797E89-FD8C-4904-9A8B-55F8D3840DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BAFDB60-1FC7-42E7-854A-9FB24E652DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786A513F-DAB0-4A19-91CA-8B30A8A507A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5108EA9C-45A6-44A6-8A04-E46988AB31DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDD4D17-2884-446E-8857-BF059264997F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3820B2FC-A566-44C1-9F98-B282A960359E\"}]}]}],\"references\":[{\"url\":\"https://fortiguard.com/psirt/FG-IR-22-345\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.