A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiIsolator version 1.0.0, FortiIsolator version 1.1.0, FortiIsolator version 1.2.0 through 1.2.2, FortiIsolator version 2.0.0 through 2.0.1, FortiIsolator version 2.1.0 through 2.1.2, FortiIsolator version 2.2.0, FortiIsolator version 2.3.0 through 2.3.4 allows attacker to execute arbitrary OS commands in the underlying shell via specially crafted input parameters.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-21-233 |
|
History
Thu, 19 Sep 2024 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:fortinet:fortiisolator:2.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiisolator:2.3.3:*:*:*:*:*:*:* |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published: 2023-10-10T16:49:46.033Z
Updated: 2024-09-18T19:48:48.594Z
Reserved: 2022-01-03T09:39:36.528Z
Link: CVE-2022-22298
Updated: 2024-08-03T03:07:50.440Z
Status : Modified
Published: 2023-10-10T17:15:10.837
Modified: 2024-11-21T06:46:35.467
Link: CVE-2022-22298
No data.