QID 376126
Date Published: 2021-12-07
QID 376126: FortiGate FortiManager and FortiAnalyzer OS command injection Vulnerability (CWE-78)
FortiManager provides centralized policy-based provisioning, device configuration, and update management for FortiGate, FortiWiFi, and FortiMail appliances, and FortiClient end-point security agents, plus end-to-end network monitoring and device control.
The vulnerability allows a local user to escalate privileges on the system. The vulnerability exists due to improper input validation in the command line interface. A local user can execute arbitrary shell commands as root via specifically crafted CLI command parameters.
Affected Products:
FortiManager versions 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5
FortiAnalyzer versions 5.6.0, 5.6.1, 5.6.2, 5.6.3, 5.6.4, 5.6.5, 5.6.6, 5.6.7, 5.6.8, 5.6.9, 5.6.10, 5.6.11, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.2.0, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5
QID Detection Logic(Authenticated):
QID will fire the command get system status and will match the affected version
The vulnerability allows a local user to escalate privileges on the system and execute arbitrary shell commands as root via specifically crafted CLI command parameters.
Customers are advised to refer to CVE-2021-26104 for more information.
- CVE-2021-26104 -
www.cybersecurity-help.cz/vdb/SB2021080319
CVEs related to QID 376126
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| CVE-2021-26104 |
|