cvelist/2021/42xxx/CVE-2021-42756.json
2023-02-16 19:00:35 +00:00

134 lines
5.6 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2021-42756",
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple stack-based buffer overflow vulnerabilities [CWE-121] in the proxy daemon of FortiWeb 5.x all versions, 6.0.7 and below, 6.1.2 and below, 6.2.6 and below, 6.3.16 and below, 6.4 all versions may allow an unauthenticated remote attacker to achieve arbitrary code execution via specifically crafted HTTP requests."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands",
"cweId": "CWE-121"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "FortiWeb",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "6.4.0",
"version_value": "6.4.1"
},
{
"version_affected": "<=",
"version_name": "6.3.0",
"version_value": "6.3.16"
},
{
"version_affected": "<=",
"version_name": "6.2.0",
"version_value": "6.2.6"
},
{
"version_affected": "<=",
"version_name": "6.1.0",
"version_value": "6.1.2"
},
{
"version_affected": "<=",
"version_name": "6.0.0",
"version_value": "6.0.7"
},
{
"version_affected": "<=",
"version_name": "5.9.0",
"version_value": "5.9.1"
},
{
"version_affected": "<=",
"version_name": "5.8.5",
"version_value": "5.8.7"
},
{
"version_affected": "<=",
"version_name": "5.8.0",
"version_value": "5.8.3"
},
{
"version_affected": "<=",
"version_name": "5.7.0",
"version_value": "5.7.3"
},
{
"version_affected": "<=",
"version_name": "5.6.0",
"version_value": "5.6.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://fortiguard.com/psirt/FG-IR-21-186",
"refsource": "MISC",
"name": "https://fortiguard.com/psirt/FG-IR-21-186"
}
]
},
"solution": [
{
"lang": "en",
"value": "Upgrade to FortiWeb 7.0.0 or above,\r\nUpgrade to FortiWeb 6.3.17 or above,\r\nUpgrade to FortiWeb 6.2.7 or above.\r\nUpgrade to FortiWeb 6.1.3 or above.\r\nUpgrade to FortiWeb 6.0.8 or above."
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C"
}
]
}
}