|
4 | 4 | "data_version": "4.0",
|
5 | 5 | "CVE_data_meta": {
|
6 | 6 | "ID": "CVE-2021-22123",
|
7 |
| - |
8 |
| - "STATE": "RESERVED" |
| 7 | + |
| 8 | + "STATE": "PUBLIC" |
| 9 | + }, |
| 10 | + "affects": { |
| 11 | + "vendor": { |
| 12 | + "vendor_data": [ |
| 13 | + { |
| 14 | + "vendor_name": "Fortinet", |
| 15 | + "product": { |
| 16 | + "product_data": [ |
| 17 | + { |
| 18 | + "product_name": "Fortinet FortiWeb", |
| 19 | + "version": { |
| 20 | + "version_data": [ |
| 21 | + { |
| 22 | + "version_value": "FortiWeb 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x" |
| 23 | + } |
| 24 | + ] |
| 25 | + } |
| 26 | + } |
| 27 | + ] |
| 28 | + } |
| 29 | + } |
| 30 | + ] |
| 31 | + } |
| 32 | + }, |
| 33 | + "impact": { |
| 34 | + "cvss": { |
| 35 | + "attackComplexity": "Low", |
| 36 | + "attackVector": "Network", |
| 37 | + "availabilityImpact": "High", |
| 38 | + "baseScore": 7.4, |
| 39 | + "baseSeverity": "High", |
| 40 | + "confidentialityImpact": "Low", |
| 41 | + "integrityImpact": "Low", |
| 42 | + "privilegesRequired": "Low", |
| 43 | + "scope": "Unchanged", |
| 44 | + "userInteraction": "None", |
| 45 | + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", |
| 46 | + "version": "3.1" |
| 47 | + } |
| 48 | + }, |
| 49 | + "problemtype": { |
| 50 | + "problemtype_data": [ |
| 51 | + { |
| 52 | + "description": [ |
| 53 | + { |
| 54 | + "lang": "eng", |
| 55 | + "value": "Execute unauthorized code or commands" |
| 56 | + } |
| 57 | + ] |
| 58 | + } |
| 59 | + ] |
| 60 | + }, |
| 61 | + "references": { |
| 62 | + "reference_data": [ |
| 63 | + { |
| 64 | + "refsource": "CONFIRM", |
| 65 | + "name": "https://fortiguard.com/advisory/FG-IR-20-120", |
| 66 | + "url": "https://fortiguard.com/advisory/FG-IR-20-120" |
| 67 | + } |
| 68 | + ] |
9 | 69 | },
|
10 | 70 | "description": {
|
11 | 71 | "description_data": [
|
12 | 72 | {
|
13 | 73 | "lang": "eng",
|
14 |
| - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." |
| 74 | + "value": "An OS command injection vulnerability in FortiWeb's management interface 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x may allow a remote authenticated attacker to execute arbitrary commands on the system via the SAML server configuration page." |
15 | 75 | }
|
16 | 76 | ]
|
17 | 77 | }
|
|
0 commit comments