Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit 998bd41

Browse files
1 parent a995cfa commit 998bd41

File tree

1 file changed

+63
-3
lines changed

1 file changed

+63
-3
lines changed

2021/22xxx/CVE-2021-22123.json

Lines changed: 63 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,74 @@
44
"data_version": "4.0",
55
"CVE_data_meta": {
66
"ID": "CVE-2021-22123",
7-
"ASSIGNER": "[email protected]",
8-
"STATE": "RESERVED"
7+
"ASSIGNER": "[email protected]",
8+
"STATE": "PUBLIC"
9+
},
10+
"affects": {
11+
"vendor": {
12+
"vendor_data": [
13+
{
14+
"vendor_name": "Fortinet",
15+
"product": {
16+
"product_data": [
17+
{
18+
"product_name": "Fortinet FortiWeb",
19+
"version": {
20+
"version_data": [
21+
{
22+
"version_value": "FortiWeb 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x"
23+
}
24+
]
25+
}
26+
}
27+
]
28+
}
29+
}
30+
]
31+
}
32+
},
33+
"impact": {
34+
"cvss": {
35+
"attackComplexity": "Low",
36+
"attackVector": "Network",
37+
"availabilityImpact": "High",
38+
"baseScore": 7.4,
39+
"baseSeverity": "High",
40+
"confidentialityImpact": "Low",
41+
"integrityImpact": "Low",
42+
"privilegesRequired": "Low",
43+
"scope": "Unchanged",
44+
"userInteraction": "None",
45+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
46+
"version": "3.1"
47+
}
48+
},
49+
"problemtype": {
50+
"problemtype_data": [
51+
{
52+
"description": [
53+
{
54+
"lang": "eng",
55+
"value": "Execute unauthorized code or commands"
56+
}
57+
]
58+
}
59+
]
60+
},
61+
"references": {
62+
"reference_data": [
63+
{
64+
"refsource": "CONFIRM",
65+
"name": "https://fortiguard.com/advisory/FG-IR-20-120",
66+
"url": "https://fortiguard.com/advisory/FG-IR-20-120"
67+
}
68+
]
969
},
1070
"description": {
1171
"description_data": [
1272
{
1373
"lang": "eng",
14-
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
74+
"value": "An OS command injection vulnerability in FortiWeb's management interface 6.3.7 and below, 6.2.3 and below, 6.1.x, 6.0.x, 5.9.x may allow a remote authenticated attacker to execute arbitrary commands on the system via the SAML server configuration page."
1575
}
1676
]
1777
}

0 commit comments

Comments
 (0)