René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

129 lines
4.1 KiB
JSON

{
"id": "CVE-2022-39947",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-01-03T17:15:10.400",
"lastModified": "2023-01-10T02:20:16.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.2, FortiADC version 6.2.0 through 6.2.3, FortiADC version version 6.1.0 through 6.1.6, FortiADC version 6.0.0 through 6.0.4, FortiADC version 5.4.0 through 5.4.5 may allow an attacker to execute unauthorized code or commands via specifically crafted HTTP requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.0",
"versionEndIncluding": "5.4.5",
"matchCriteriaId": "54EBC78D-0358-474F-9654-3EF9950D563B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndIncluding": "6.0.4",
"matchCriteriaId": "3ADB57D8-1ABE-4401-B1B0-4640A34C555A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.0",
"versionEndIncluding": "6.1.6",
"matchCriteriaId": "D31CF79E-6C56-4CD0-9DD2-FBB48D503786"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndIncluding": "6.2.3",
"matchCriteriaId": "51C6A8FD-8D0D-4CBA-BA34-A34D12CE69ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A58AA-5F2F-4CC3-8299-EC320E36CF5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE3123F6-4360-45F8-9A90-C0D35CC73D1D"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-061",
"source": "psirt@fortinet.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}