Fortinet.FortiWeb.SAML.Server.Configuration.Command.Injection
Description
This indicates an attack attempt to exploit a Command Injection Error Vulnerability in Fortinet FortiWeb.
The vulnerability is due to insufficient input validation of the name parameter in requests sent to the SAML server configuration page. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could result in arbitrary command execution with privileges of the root user.
Affected Products
Fortinet FortiWeb 6.2.x prior to 6.2.5
Fortinet FortiWeb 6.3.x prior to 6.3.15
Fortinet FortiWeb 6.4.0
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://www.fortiguard.com/psirt/FG-IR-21-116
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |