cve-2023-40716
Vulnerability from cvelistv5
Published
2023-12-13 06:44
Modified
2024-08-02 18:38
Severity ?
EPSS score ?
Summary
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .
References
▼ | URL | Tags | |
---|---|---|---|
psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-22-345 | Vendor Advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Fortinet | FortiTester |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:51.171Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-22-345", "tags": [ "x_transferred" ], "url": "https://fortiguard.com/psirt/FG-IR-22-345" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FortiTester", "vendor": "Fortinet", "versions": [ { "lessThanOrEqual": "7.2.3", "status": "affected", "version": "7.2.0", "versionType": "semver" }, { "lessThanOrEqual": "7.1.1", "status": "affected", "version": "7.1.0", "versionType": "semver" }, { "status": "affected", "version": "7.0.0" }, { "lessThanOrEqual": "4.2.1", "status": "affected", "version": "4.2.0", "versionType": "semver" }, { "lessThanOrEqual": "4.1.1", "status": "affected", "version": "4.1.0", "versionType": "semver" }, { "status": "affected", "version": "4.0.0" }, { "lessThanOrEqual": "3.9.2", "status": "affected", "version": "3.9.0", "versionType": "semver" }, { "status": "affected", "version": "3.8.0" }, { "lessThanOrEqual": "3.7.1", "status": "affected", "version": "3.7.0", "versionType": "semver" }, { "status": "affected", "version": "3.6.0" }, { "lessThanOrEqual": "3.5.1", "status": "affected", "version": "3.5.0", "versionType": "semver" }, { "status": "affected", "version": "3.4.0" }, { "lessThanOrEqual": "3.3.1", "status": "affected", "version": "3.3.0", "versionType": "semver" }, { "status": "affected", "version": "3.2.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.9.0" }, { "status": "affected", "version": "2.8.0" }, { "status": "affected", "version": "2.7.0" }, { "status": "affected", "version": "2.6.0" }, { "status": "affected", "version": "2.5.0" }, { "lessThanOrEqual": "2.4.1", "status": "affected", "version": "2.4.0", "versionType": "semver" }, { "status": "affected", "version": "2.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "An improper neutralization of special elements used in an OS command vulnerability [CWE-78] \u00a0in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup ." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:X/RC:C", "version": "3.1" }, "format": "CVSS" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "Execute unauthorized code or commands", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-13T06:44:03.852Z", "orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "shortName": "fortinet" }, "references": [ { "name": "https://fortiguard.com/psirt/FG-IR-22-345", "url": "https://fortiguard.com/psirt/FG-IR-22-345" } ], "solutions": [ { "lang": "en", "value": "Please upgrade to FortiTester version 7.3.0 or above \n" } ] } }, "cveMetadata": { "assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8", "assignerShortName": "fortinet", "cveId": "CVE-2023-40716", "datePublished": "2023-12-13T06:44:03.852Z", "dateReserved": "2023-08-21T09:03:44.315Z", "dateUpdated": "2024-08-02T18:38:51.171Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-40716\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2023-12-13T07:15:14.223\",\"lastModified\":\"2023-12-15T19:06:24.823\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An improper neutralization of special elements used in an OS command vulnerability [CWE-78] \u00a0in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .\"},{\"lang\":\"es\",\"value\":\"Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando del sistema operativo [CWE-78] en el int\u00e9rprete de l\u00ednea de comando de FortiTester 2.3.0 a 7.2.3 puede permitir que un atacante autenticado ejecute comandos no autorizados a trav\u00e9s de argumentos espec\u00edficamente manipulados al ejecutar ejecutar restauraci\u00f3n/copia de seguridad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"psirt@fortinet.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"psirt@fortinet.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20DC6A76-A91E-49D8-AD5F-5A53E6FD56A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835CFB56-B366-44F2-BC0D-797973E29341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05D6DD1E-24F5-49C4-9BAF-2E4FA682F41F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A59274-C7AE-456B-821A-4A41DAE51DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF739FA1-C8A1-4CCD-BCA4-1A9ABD31D926\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71DF1A6A-B574-48E7-9337-A986EAD45441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B23B49A-6BEF-4662-A19A-AA53B6A61913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:2.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F632D17B-0864-4965-92CD-7B58CB88506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98433F67-056E-4371-B482-93A2EBF0C237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8609203-C2ED-4821-A836-E81479406B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0E475B-5CDF-40DB-A923-5DEB093D246E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7C93812-ED30-40EC-81C2-159D2095A8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61C7F802-1490-467A-B5B6-0B2AFD468439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75CB9729-BCDE-41F4-8684-01FF62794E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED9A5FF-B3A5-4DA8-AF7E-7B6C107A6C02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8CCDEF0-9026-4F67-95B1-07286EFBB370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC82DC7-5C3C-452A-BB1D-021D935851EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49A75B9A-D1A1-4E6A-84C7-1701DE00C8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2934396-D757-4079-A5D7-65133CF833DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83A5237C-C126-4AEA-8CE8-DEC82DDEC69D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14C2E2DA-6CE2-4B5E-A6CB-029967EAAFA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"492036BF-130B-435B-9EDD-71732CD663A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:3.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB540E8-5B68-4F20-970E-63B70FFA3C83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A3ABD7-9694-4784-9CD4-E8A1FA715682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79982C9-CB89-41B9-A294-B9830897304A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB327AD-00E1-4397-B992-E182785E8ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E47F051E-5D15-456D-9C0D-1AE6FF347155\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:4.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D32E37C0-6ABE-46D2-987B-EC5E7F6BEF75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90D54E79-62C6-427F-9DD1-B3A99944E418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48797E89-FD8C-4904-9A8B-55F8D3840DB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BAFDB60-1FC7-42E7-854A-9FB24E652DE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"786A513F-DAB0-4A19-91CA-8B30A8A507A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5108EA9C-45A6-44A6-8A04-E46988AB31DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EDD4D17-2884-446E-8857-BF059264997F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortitester:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3820B2FC-A566-44C1-9F98-B282A960359E\"}]}]}],\"references\":[{\"url\":\"https://fortiguard.com/psirt/FG-IR-22-345\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.