<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Command injection in Automation/Webhook module</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-22-310</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2023-09-13T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2023-09-13T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2023-09-13T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiADC may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
        </cvrf:Note>
        <cvrf:Note Title="Description" Type="General" Ordinal="2">
            None
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="3">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="4">
            FortiADC 7.4 all versions are not affectedFortiADC 7.2 all versions are not affectedFortiADC version 7.1.0 through 7.1.1FortiADC version 7.0.0 through 7.0.3FortiADC version 6.2.0 through 6.2.5FortiADC 6.1 all versionsFortiADC 6.0 all versions are not affectedFortiADC 5.4 all versions are not affectedFortiADC 5.3 all versions are not affected
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="5">
            Please upgrade to FortiADC version 7.1.2 or abovePlease upgrade to FortiADC version 7.0.4 or abovePlease upgrade to FortiADC version 6.2.6 or above
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <ProductTree>
        <Branch Name="Fortinet" Type="Vendor">
            <Branch Name="FortiADC" Type="Product Name">
                <Branch Name="7.1.1" Type="Product Version">
                    <FullProductName ProductID="FortiADC-7.1.1">FortiADC 7.1.1</FullProductName>
                </Branch>
                <Branch Name="7.1.0" Type="Product Version">
                    <FullProductName ProductID="FortiADC-7.1.0">FortiADC 7.1.0</FullProductName>
                </Branch>
                <Branch Name="7.0.3" Type="Product Version">
                    <FullProductName ProductID="FortiADC-7.0.3">FortiADC 7.0.3</FullProductName>
                </Branch>
                <Branch Name="7.0.2" Type="Product Version">
                    <FullProductName ProductID="FortiADC-7.0.2">FortiADC 7.0.2</FullProductName>
                </Branch>
                <Branch Name="7.0.1" Type="Product Version">
                    <FullProductName ProductID="FortiADC-7.0.1">FortiADC 7.0.1</FullProductName>
                </Branch>
                <Branch Name="7.0.0" Type="Product Version">
                    <FullProductName ProductID="FortiADC-7.0.0">FortiADC 7.0.0</FullProductName>
                </Branch>
                <Branch Name="6.2.5" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.2.5">FortiADC 6.2.5</FullProductName>
                </Branch>
                <Branch Name="6.2.4" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.2.4">FortiADC 6.2.4</FullProductName>
                </Branch>
                <Branch Name="6.2.3" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.2.3">FortiADC 6.2.3</FullProductName>
                </Branch>
                <Branch Name="6.2.2" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.2.2">FortiADC 6.2.2</FullProductName>
                </Branch>
                <Branch Name="6.2.1" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.2.1">FortiADC 6.2.1</FullProductName>
                </Branch>
                <Branch Name="6.2.0" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.2.0">FortiADC 6.2.0</FullProductName>
                </Branch>
                <Branch Name="6.1.6" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.1.6">FortiADC 6.1.6</FullProductName>
                </Branch>
                <Branch Name="6.1.5" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.1.5">FortiADC 6.1.5</FullProductName>
                </Branch>
                <Branch Name="6.1.4" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.1.4">FortiADC 6.1.4</FullProductName>
                </Branch>
                <Branch Name="6.1.3" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.1.3">FortiADC 6.1.3</FullProductName>
                </Branch>
                <Branch Name="6.1.2" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.1.2">FortiADC 6.1.2</FullProductName>
                </Branch>
                <Branch Name="6.1.1" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.1.1">FortiADC 6.1.1</FullProductName>
                </Branch>
                <Branch Name="6.1.0" Type="Product Version">
                    <FullProductName ProductID="FortiADC-6.1.0">FortiADC 6.1.0</FullProductName>
                </Branch>
            </Branch>
        </Branch>
    </ProductTree>
    <Vulnerability Ordinal="1">
        <Title>Command injection in Automation/Webhook module</Title>
        <cvrf:CVE>CVE-2022-35849</cvrf:CVE>
        <ProductStatuses>
            <Status Type="Known Affected">
                <ProductID>FortiADC-7.1.1</ProductID>
                <ProductID>FortiADC-7.1.0</ProductID>
                <ProductID>FortiADC-7.0.3</ProductID>
                <ProductID>FortiADC-7.0.2</ProductID>
                <ProductID>FortiADC-7.0.1</ProductID>
                <ProductID>FortiADC-7.0.0</ProductID>
                <ProductID>FortiADC-6.2.5</ProductID>
                <ProductID>FortiADC-6.2.4</ProductID>
                <ProductID>FortiADC-6.2.3</ProductID>
                <ProductID>FortiADC-6.2.2</ProductID>
                <ProductID>FortiADC-6.2.1</ProductID>
                <ProductID>FortiADC-6.2.0</ProductID>
                <ProductID>FortiADC-6.1.6</ProductID>
                <ProductID>FortiADC-6.1.5</ProductID>
                <ProductID>FortiADC-6.1.4</ProductID>
                <ProductID>FortiADC-6.1.3</ProductID>
                <ProductID>FortiADC-6.1.2</ProductID>
                <ProductID>FortiADC-6.1.1</ProductID>
                <ProductID>FortiADC-6.1.0</ProductID>
            </Status>
        </ProductStatuses>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>7.4</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-22-310</URL>
                <Description>Command injection in Automation/Webhook module</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>