A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiADC version 7.0.0 through 7.0.2, FortiADC version 6.2.0 through 6.2.3, FortiADC version version 6.1.0 through 6.1.6, FortiADC version 6.0.0 through 6.0.4, FortiADC version 5.4.0 through 5.4.5 may allow an attacker to execute unauthorized code or commands via specifically crafted HTTP requests.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-22-061 |
![]() ![]() |
History
Wed, 23 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:50:58.743Z
Reserved: 2022-09-05T13:11:35.552Z
Link: CVE-2022-39947

Updated: 2024-08-03T12:07:43.042Z

Status : Modified
Published: 2023-01-03T17:15:10.400
Modified: 2024-11-21T07:18:32.310
Link: CVE-2022-39947

No data.