2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-33870" ,
"sourceIdentifier" : "psirt@fortinet.com" ,
"published" : "2022-11-02T12:15:53.053" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:08:29.703" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 3.0.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands."
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Una neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando del sistema operativo [CWE-78] en el int\u00e9rprete de l\u00ednea de comando de FortiTester 3.0.0 a 3.9.1, 4.0.0 a 4.2.0, 7.0.0 a 7.1.0 puede permitir una atacante autenticado ejecute comandos no autorizados a trav\u00e9s de argumentos espec\u00edficamente manipulados para comandos existentes."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "psirt@fortinet.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98433F67-056E-4371-B482-93A2EBF0C237"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D8609203-C2ED-4821-A836-E81479406B8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3A0E475B-5CDF-40DB-A923-5DEB093D246E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E7C93812-ED30-40EC-81C2-159D2095A8F5"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "61C7F802-1490-467A-B5B6-0B2AFD468439"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "75CB9729-BCDE-41F4-8684-01FF62794E13"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1ED9A5FF-B3A5-4DA8-AF7E-7B6C107A6C02"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A8CCDEF0-9026-4F67-95B1-07286EFBB370"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1FC82DC7-5C3C-452A-BB1D-021D935851EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49A75B9A-D1A1-4E6A-84C7-1701DE00C8A9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D2934396-D757-4079-A5D7-65133CF833DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "83A5237C-C126-4AEA-8CE8-DEC82DDEC69D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "14C2E2DA-6CE2-4B5E-A6CB-029967EAAFA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "492036BF-130B-435B-9EDD-71732CD663A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "23A3ABD7-9694-4784-9CD4-E8A1FA715682"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E79982C9-CB89-41B9-A294-B9830897304A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7BB327AD-00E1-4397-B992-E182785E8ECC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E47F051E-5D15-456D-9C0D-1AE6FF347155"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "90D54E79-62C6-427F-9DD1-B3A99944E418"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "48797E89-FD8C-4904-9A8B-55F8D3840DB2"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://fortiguard.com/psirt/FG-IR-22-070" ,
"source" : "psirt@fortinet.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://fortiguard.com/psirt/FG-IR-22-070" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}