An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 3.0.0 up to and including 3.9.1, 4.0.0 up to and including 4.2.0, 7.0.0 up to and including 7.1.0 may allow an authenticated malicious user to execute unauthorized commands via specifically crafted arguments to existing commands.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fortinet fortitester 3.8.0 |
||
fortinet fortitester 7.0.0 |
||
fortinet fortitester 7.1.0 |
||
fortinet fortitester 3.0.0 |
||
fortinet fortitester 3.1.0 |
||
fortinet fortitester 3.2.0 |
||
fortinet fortitester 3.3.1 |
||
fortinet fortitester 3.3.0 |
||
fortinet fortitester 3.4.0 |
||
fortinet fortitester 3.5.0 |
||
fortinet fortitester 3.5.1 |
||
fortinet fortitester 3.6.0 |
||
fortinet fortitester 3.7.0 |
||
fortinet fortitester 3.7.1 |
||
fortinet fortitester 3.9.0 |
||
fortinet fortitester 3.9.1 |
||
fortinet fortitester 4.0.0 |
||
fortinet fortitester 4.1.0 |
||
fortinet fortitester 4.1.1 |
||
fortinet fortitester 4.2.0 |