cve/2023/CVE-2023-48788.md

28 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-28 08:49:17 +00:00
### [CVE-2023-48788](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48788)
![](https://img.shields.io/static/v1?label=Product&message=FortiClientEMS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.2.0%3C%3D%207.2.2%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Execute%20unauthorized%20code%20or%20commands&color=brighgreen)
### Description
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/CVETechnologic/CVE-2023-48788-Proof-of-concept-SQLinj
- https://github.com/NaInSec/CVE-LIST
- https://github.com/Ostorlab/KEV
- https://github.com/TheRedDevil1/CVE-2023-48788
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/horizon3ai/CVE-2023-48788
- https://github.com/k4rd3n/CVE-2023-48788-PoC
- https://github.com/mrobsidian1/CVE-2023-48788-Proof-of-concept-SQLinj
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/tanjiti/sec_profile
- https://github.com/toxyl/lscve