<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>OS command injection in Report Server</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-23-135</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2023-11-14T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2023-11-14T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2023-11-13T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in FortiSIEM report server may allow a remote unauthenticated attacker to execute unauthorized commands via crafted API requests.This vulnerability was internally discovered as a variant of FG-IR-23-130.
        </cvrf:Note>
        <cvrf:Note Title="Description" Type="General" Ordinal="2">
            None
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="3">
            Execute unauthorized code or commands
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="4">
            FortiSIEM 7.1 all versions are not affectedFortiSIEM 7.0 all versions are not affectedFortiSIEM 6.7 all versions are not affectedFortiSIEM 6.6 all versions are not affectedFortiSIEM 6.5 all versions are not affectedFortiSIEM 6.4 all versions are not affectedFortiSIEM 6.3 all versions are not affectedFortiSIEM 6.2 all versions are not affectedFortiSIEM 6.1 all versions are not affectedFortiSIEM 5.4 all versionsFortiSIEM 5.3 all versionsFortiSIEM 5.2 all versionsFortiSIEM 5.1 all versionsFortiSIEM 5.0 all versionsFortiSIEM 4.10 all versionsFortiSIEM 4.9 all versionsFortiSIEM 4.7 all versions
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="5">
            Please upgrade to FortiSIEM version 7.1.0 or abovePlease upgrade to FortiSIEM version 7.0.1 or abovePlease upgrade to FortiSIEM version 6.7.6 or abovePlease upgrade to FortiSIEM version 6.6.4 or abovePlease upgrade to FortiSIEM version 6.5.2 or abovePlease upgrade to FortiSIEM version 6.4.3 or above
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Internally discovered and reported by Adham El karn of Fortinet Product Security team.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <ProductTree>
        <Branch Name="Fortinet" Type="Vendor">
            <Branch Name="FortiSIEM" Type="Product Name">
                <Branch Name="5.4.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.4.0">FortiSIEM 5.4.0</FullProductName>
                </Branch>
                <Branch Name="5.3.3" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.3.3">FortiSIEM 5.3.3</FullProductName>
                </Branch>
                <Branch Name="5.3.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.3.2">FortiSIEM 5.3.2</FullProductName>
                </Branch>
                <Branch Name="5.3.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.3.1">FortiSIEM 5.3.1</FullProductName>
                </Branch>
                <Branch Name="5.3.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.3.0">FortiSIEM 5.3.0</FullProductName>
                </Branch>
                <Branch Name="5.2.8" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.2.8">FortiSIEM 5.2.8</FullProductName>
                </Branch>
                <Branch Name="5.2.7" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.2.7">FortiSIEM 5.2.7</FullProductName>
                </Branch>
                <Branch Name="5.2.6" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.2.6">FortiSIEM 5.2.6</FullProductName>
                </Branch>
                <Branch Name="5.2.5" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.2.5">FortiSIEM 5.2.5</FullProductName>
                </Branch>
                <Branch Name="5.2.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.2.2">FortiSIEM 5.2.2</FullProductName>
                </Branch>
                <Branch Name="5.2.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.2.1">FortiSIEM 5.2.1</FullProductName>
                </Branch>
                <Branch Name="5.1.3" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.1.3">FortiSIEM 5.1.3</FullProductName>
                </Branch>
                <Branch Name="5.1.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.1.2">FortiSIEM 5.1.2</FullProductName>
                </Branch>
                <Branch Name="5.1.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.1.1">FortiSIEM 5.1.1</FullProductName>
                </Branch>
                <Branch Name="5.1.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.1.0">FortiSIEM 5.1.0</FullProductName>
                </Branch>
                <Branch Name="5.0.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.0.1">FortiSIEM 5.0.1</FullProductName>
                </Branch>
                <Branch Name="5.0.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-5.0.0">FortiSIEM 5.0.0</FullProductName>
                </Branch>
                <Branch Name="4.10.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-4.10.0">FortiSIEM 4.10.0</FullProductName>
                </Branch>
                <Branch Name="4.9.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-4.9.0">FortiSIEM 4.9.0</FullProductName>
                </Branch>
                <Branch Name="4.7.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-4.7.2">FortiSIEM 4.7.2</FullProductName>
                </Branch>
            </Branch>
        </Branch>
    </ProductTree>
    <Vulnerability Ordinal="1">
        <Title>OS command injection in Report Server</Title>
        <cvrf:CVE>CVE-2023-36553</cvrf:CVE>
        <ProductStatuses>
            <Status Type="Known Affected">
                <ProductID>FortiSIEM-5.4.0</ProductID>
                <ProductID>FortiSIEM-5.3.3</ProductID>
                <ProductID>FortiSIEM-5.3.2</ProductID>
                <ProductID>FortiSIEM-5.3.1</ProductID>
                <ProductID>FortiSIEM-5.3.0</ProductID>
                <ProductID>FortiSIEM-5.2.8</ProductID>
                <ProductID>FortiSIEM-5.2.7</ProductID>
                <ProductID>FortiSIEM-5.2.6</ProductID>
                <ProductID>FortiSIEM-5.2.5</ProductID>
                <ProductID>FortiSIEM-5.2.2</ProductID>
                <ProductID>FortiSIEM-5.2.1</ProductID>
                <ProductID>FortiSIEM-5.1.3</ProductID>
                <ProductID>FortiSIEM-5.1.2</ProductID>
                <ProductID>FortiSIEM-5.1.1</ProductID>
                <ProductID>FortiSIEM-5.1.0</ProductID>
                <ProductID>FortiSIEM-5.0.1</ProductID>
                <ProductID>FortiSIEM-5.0.0</ProductID>
                <ProductID>FortiSIEM-4.10.0</ProductID>
                <ProductID>FortiSIEM-4.9.0</ProductID>
                <ProductID>FortiSIEM-4.7.2</ProductID>
            </Status>
        </ProductStatuses>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>9.3</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-23-135</URL>
                <Description>OS command injection in Report Server</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>